mrtommyhanks
April 17th, 2006, 20:49
Hi,
I'm having a lot of trouble with a particular program I have been trying to reverse.
I used softice and was able (after countless hours) to find the "key" jump instruction i'm trying to bypass, I even know what to change the value to so that it works (I modifed the code in memory and it worked)
The huge problem I have also spent countless hours trying to figure out is where the code is in the executable file.
I am kind of new to reversing but in all the examples I have walked through it was no big deal to find the code using wdasm32 or even hexview if you know the hex values (which I do in this case).
Problem is I search and nothing. This particular jump is the jle instruction and I even went one by one through wdasm32 through all the jle instructions and there is nothing that looks like what I am seeing in memory.
The program only has two files, the executable and a dll file (which I also searched through extensively). As well I used filemon to see if there was a hidden file someone that it accesses to load this code into memory but I could not see anything other than the windows dll files that it calls.
I don't know if maybe the program uses some protection scheme where it modifies the code somehow before it gets to memory ? I tried using IDA to dissassemble the executable and I get almost no code at all (at least in wdasm32 I get something).
Any help is greatly appretiated.
Thanks,
Tom
I'm having a lot of trouble with a particular program I have been trying to reverse.
I used softice and was able (after countless hours) to find the "key" jump instruction i'm trying to bypass, I even know what to change the value to so that it works (I modifed the code in memory and it worked)
The huge problem I have also spent countless hours trying to figure out is where the code is in the executable file.
I am kind of new to reversing but in all the examples I have walked through it was no big deal to find the code using wdasm32 or even hexview if you know the hex values (which I do in this case).
Problem is I search and nothing. This particular jump is the jle instruction and I even went one by one through wdasm32 through all the jle instructions and there is nothing that looks like what I am seeing in memory.
The program only has two files, the executable and a dll file (which I also searched through extensively). As well I used filemon to see if there was a hidden file someone that it accesses to load this code into memory but I could not see anything other than the windows dll files that it calls.
I don't know if maybe the program uses some protection scheme where it modifies the code somehow before it gets to memory ? I tried using IDA to dissassemble the executable and I get almost no code at all (at least in wdasm32 I get something).
Any help is greatly appretiated.
Thanks,
Tom