![]() ![]() Step 4: Restarting is as easy as switching to Ollybdg and hitting Ctrl + F2. It is always worth the try! OK from this point on it seems we can't do anything else, so let us go ahead and restart the program. Let us enter the password then =)Īnd you can see I was wrong. So if the author of the Crackme is not lying then we already have discovered an important clue just from running the app. It is not every day that a Crackme will tell you how the password (or answer) is shaped. We are asked to enter a password, but the program says that the password is NUMBERS ONLY. Since we only have one possible path to go at the moment, let us tread along. We immediately notice that the Crackme is a console app, so that kind of takes away the need to search around. Step 3: Okay so the Crackme is running! Let us go ahead and look around for some juicy stuff. ![]() Third: select Debug from the menu and hit run. First: run the Crackme outside of Ollydbg =) Second: click on the play icon in Ollydbg which is located underneath the 'w' in View on the menu bar. So let's go ahead and run the program to scout for juicy information. Step 2: The first thing we do every time we want to solve a Crackme is run it. Your Ollydbg should look like mine from the picture below when the Crackme is successfully loaded. Step 1: Open ReWrit's Crackme #1 inside Ollydbg. Because this tutorial is supposed to be stand-alone I will go over the steps covered in tutorial 1 & 2 to reaching the string we need. Here is a link to tutorial one if you need instructions on getting the Crackmes. We are going to use the same exact Crackmes that we used in both tutorial 1 & 2. Reading tutorial 1 & 2 will help you understand this one. If you find yourself completely lost in this tutorial, do not feel that reversing isn't for you. NOTE: The knowledge from tutorial 1 & 2 is not needed for learning this technique HOWEVER, if you want to be a good reverse engineer, then you will want to learn what was covered in tutorial 1 & 2. Greetings everyone and welcome to the third tutorial of the reverse engineering for newbs series. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |