Cc6003ni WK04 T 94536
Cc6003ni WK04 T 94536
Oftentimes, reverse engineering is used to break software protections. But with good
intentions, it gives you the power to identify malicious codes and hidden backdoors.
Speaking of reverse engineering tools and techniques trade, there are primarily two types
of approach. Offline Code analysis and live code analysis.
Let’s get started for this week’s workshop. You will be provided with one executable file.
We will experiment on cracking this executable to bypass serial key requirements. Note
that a typical reverse engineering process involves picking up some breakpoint or
reference point inside the program which will help us manoeuvre inside the
debugger/disassembler. This in turn will allow us to see various inner functions which will
aid further in reversing.
Step 1:
You have to enable “multiarch” in the terminal to define your system architecture. Also,
update your APT again.
Step 3:
Now write the following command in your terminal window to install the Wine
recommended version.
Step 4:
When the installation completes, you will be able to check the installed version via the
following command.
$ wine --version
Step: 5
Finally run ollydbg by right-clicking on the exe file and selecting wine, double-clicking on
the icon or executing it directly from the wine library.
$ wine ollydbg.exe
---- THE END -----