blink4me
July 3rd, 2002, 22:53
Hi,
I have searched and found nothing about this topic in particular. I have a prog that seems to be an exe created by installshield. The extractor is InstallShield Self-Extractor. Normaly, you would just run it and then take the ins/inx and that was extracted to a temp dir. But this installshield, does not extrac its stuff, it asks for a pw before extracting. I tried dissambling it with w32dasm and ida and found myself completly lost in the code. I looked at a few jumps before the call to MessageBoxA (the pw is invalid...) but cant figure it out. Could somebody explain to how I could possibly reverse this without softice. There was one topic that kind of was about this stuff but they used softice. Appreciate your help.
J
I have searched and found nothing about this topic in particular. I have a prog that seems to be an exe created by installshield. The extractor is InstallShield Self-Extractor. Normaly, you would just run it and then take the ins/inx and that was extracted to a temp dir. But this installshield, does not extrac its stuff, it asks for a pw before extracting. I tried dissambling it with w32dasm and ida and found myself completly lost in the code. I looked at a few jumps before the call to MessageBoxA (the pw is invalid...) but cant figure it out. Could somebody explain to how I could possibly reverse this without softice. There was one topic that kind of was about this stuff but they used softice. Appreciate your help.
J