Lou Cypher
April 4th, 2001, 15:24
After going over countless of tutorials on reverse engineering I finally figured out how to use softice. The problem with most tutorials is that they assume that you have some kind of knowledge on the subject matter and while some people might have knowledge in assembly language it doesn't mean that they automatically have knowledge on softice. I know a little bit of assembly but I am new to this reverse engineering thing so I would like to share my troubles with anyone who is willing to listen so that if you don't know much about reverse engineering you can learn from my mistakes and try not to make them.
The most important thing I have learned is the use of breakpoints from a tutorial I found in http://azrael.mine.nu/underground/softicetuts/bps.htm but still I am not very comfortable with the softice dos screen. Is there a way to print out or make a text file of the info uncovered by the breakpoints? I am using sofice 4.05 under windoze 98 and I would prefer if I could use the softice log file as a reference for searching for the breakpoints in a hex editor like Hex Workshop in which I can print out or do some cutting and pasting. Can this be done? Is the softice log file good for anything or is it there just for amusement? This is the information I get on my softice log file:
WINICE: Load32 Obj=0002 Add=016F:BFF5D000 Len=00001000 Mod=USER32
I guess my question really is if the Add= is the location of the operation being executed in the Mod= file in this case user32.dll?
Thanks for listening,
Lou Cypher
The most important thing I have learned is the use of breakpoints from a tutorial I found in http://azrael.mine.nu/underground/softicetuts/bps.htm but still I am not very comfortable with the softice dos screen. Is there a way to print out or make a text file of the info uncovered by the breakpoints? I am using sofice 4.05 under windoze 98 and I would prefer if I could use the softice log file as a reference for searching for the breakpoints in a hex editor like Hex Workshop in which I can print out or do some cutting and pasting. Can this be done? Is the softice log file good for anything or is it there just for amusement? This is the information I get on my softice log file:
WINICE: Load32 Obj=0002 Add=016F:BFF5D000 Len=00001000 Mod=USER32
I guess my question really is if the Add= is the location of the operation being executed in the Mod= file in this case user32.dll?
Thanks for listening,
Lou Cypher