Forum: .NET Reverse Engineering
02-28-2011, 04:40 AM
|
Replies: 6
Views: 14,297
|
Forum: .NET Reverse Engineering
02-27-2011, 07:37 AM
|
Replies: 6
Views: 14,297
|
Forum: .NET Reverse Engineering
08-20-2009, 03:40 AM
|
Replies: 1
Views: 12,000
|
Forum: .NET Reverse Engineering
01-03-2009, 08:26 AM
|
Replies: 6
Views: 16,087
|
Forum: .NET Reverse Engineering
12-12-2008, 06:01 PM
|
Replies: 17
Views: 29,285
I used windbg and sos to unpack it:
1. load...
I used windbg and sos to unpack it:
1. load SampleCrackme.exe into windbg
2. let the program run (Debug->Go)
3. as soon as mscorwks is loaded, you can break (Debug->break)
4. load sos:
on the...
|
Forum: .NET Reverse Engineering
12-12-2008, 02:25 PM
|
Replies: 17
Views: 29,285
too eazy...
Hi,
I unpacked it dynamically, then ildasm/ilasm did the job for chalenge 1 and 2.
about chalenge 3 :the serial for 'rongchaua' is 'cm9uZ2NoYXVh', isn't it ?
Regards,
Phil.
|