0% found this document useful (0 votes)
15 views3 pages

Cc6003ni WK04 T 94536

This document discusses different approaches to reverse engineering software, including offline code analysis, live code analysis, cracking, patching, and keygenning. It provides instructions on downloading and installing Ollydbg reverse engineering software and Wine for Ubuntu 20.04 to experiment with cracking an executable file in order to bypass a serial key requirement.

Uploaded by

np01nt4a210037
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views3 pages

Cc6003ni WK04 T 94536

This document discusses different approaches to reverse engineering software, including offline code analysis, live code analysis, cracking, patching, and keygenning. It provides instructions on downloading and installing Ollydbg reverse engineering software and Wine for Ubuntu 20.04 to experiment with cracking an executable file in order to bypass a serial key requirement.

Uploaded by

np01nt4a210037
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Week 4 Lab 01:

Applying Reverse Engineering to Break software

Oftentimes, reverse engineering is used to break software protections. But with good
intentions, it gives you the power to identify malicious codes and hidden backdoors.
Speaking of reverse engineering tools and techniques trade, there are primarily two types
of approach. Offline Code analysis and live code analysis.

Offline Code Analysis


This approach involves taking binary executables and disassembling or decompiling it so
that the inner structure of the file is revealed. Offline code analysis often enables safe
unpacking of malware samples and allows to view the inner working of a program without
even executing it. This approach often requires advanced reverse engineering skills since
reversers must be fluent in assembly language, machine architecture, a compiler which
was used to compile the program and used programming language itself.

Live Code Analysis


Unlike offline analysis, you run the binary executable in a debugger or inside an
executable environment (often inside sandbox) while doing live code analysis. Reverse
engineering binaries where programs are packed (encrypted or compressed) and are
unpacked only in runtime are only possible via the Live Code Analysis approach.
Before we start, on the offensive side of reverse engineering includes cracking, patching
and keygenning.

Cracking often includes breaking programs in such a way that it behaves in an


unintended way. It often includes exploiting some vulnerabilities found in the program.
Patching is the process of modifying code in binary executables to alter its intended
behaviour. Patching typically performed by crackers while cracking the executables.
Keygenning is a process where reversers reap the underlying algorithm used to generate
serial keys or alike and construct custom programs which produce keys related to target
executables.

Let’s get started for this week’s workshop. You will be provided with one executable file.
We will experiment on cracking this executable to bypass serial key requirements. Note
that a typical reverse engineering process involves picking up some breakpoint or
reference point inside the program which will help us manoeuvre inside the
debugger/disassembler. This in turn will allow us to see various inner functions which will
aid further in reversing.

Download Ollydbg: http://www.ollydbg.de/version2.html

Installing Wine in Ubuntu 20.04

Step 1:

As always, first, update and upgrade your APT.

$ sudo apt update


Step 2:

You have to enable “multiarch” in the terminal to define your system architecture. Also,
update your APT again.

sudo dpkg --add-architecture i386


sudo apt update

Step 3:

Now write the following command in your terminal window to install the Wine
recommended version.

sudo apt install wine64 wine32


This stable version includes all the necessary libraries needed for the WineHQ stable
utility.

Step 4:

When the installation completes, you will be able to check the installed version via the
following command.

$ wine --version
Step: 5

Finally run ollydbg by right-clicking on the exe file and selecting wine, double-clicking on
the icon or executing it directly from the wine library.

$ wine ollydbg.exe
---- THE END -----

You might also like