Forum: .NET Reverse Engineering
09-25-2008, 02:23 AM
|
Replies: 23
Views: 43,674
|
Forum: Steganography + Cryptography
09-25-2008, 02:21 AM
|
Replies: 2
Views: 30,055
Hi,
These are only BigNumbers, that could be...
Hi,
These are only BigNumbers, that could be used by many..many algorithms you have to check the xRefs with IDA and watch how they are used, and after you can detect the Algorithm.
At the actual...
|
Forum: File Unpacking
03-02-2008, 03:05 AM
|
Replies: 2
Views: 15,364
|
Forum: Comments
03-02-2008, 03:04 AM
|
Replies: 5
Views: 39,992
Many many years ago, when I started to study Sw...
Many many years ago, when I started to study Sw protections, there were many important Sw, for Structural Analysis and CAD Design, that implemented basical protections.
(Laser Micro Drilled Floppy,...
|
Forum: General Forum
01-19-2008, 02:51 PM
|
Replies: 17
Views: 26,684
|
Forum: General Forum
01-16-2008, 04:03 AM
|
Replies: 17
Views: 26,684
|
Forum: General Forum
12-31-2007, 07:03 AM
|
Replies: 17
Views: 26,684
|
Forum: File Unpacking
09-15-2007, 12:45 PM
|
Replies: 2
Views: 18,406
|
Forum: Steganography + Cryptography
08-06-2007, 06:10 AM
|
Replies: 2
Views: 26,603
|
Forum: Steganography + Cryptography
07-25-2007, 04:59 AM
|
Replies: 2
Views: 26,603
Qrbg
Hello Dear Comunity,
Here an intersing link of an online QRBG: http://random.irb.hr/
QRBG stands for Quantum Random Bit Generator, a "new" generation of RNG, it's a non-deterministic generator,...
|
Forum: Console ReEngineering
07-24-2007, 06:00 AM
|
Replies: 3
Views: 39,272
Hi,
It depends from the Hardware that you...
Hi,
It depends from the Hardware that you have, some hw could be efficiently disassembled by IDA (just check into IDA if your hardware is supported).
ELSE make a google search for more specific...
|
Forum: General Forum
05-12-2007, 12:31 PM
|
Replies: 208
Views: 246,389
|
Forum: Steganography + Cryptography
04-14-2007, 05:00 AM
|
Replies: 1
Views: 22,883
Breaking 104 bit WEP in less than 60 seconds
Hello Dear Community http://www.woodmann.com/forum/images/smilies/smile.gif
http://eprint.iacr.org/2007/120.pdf
Here you can find a new Attack to WEP, directly derived from Klein's Attack,
but...
|
Forum: Steganography + Cryptography
04-10-2007, 04:09 AM
|
Replies: 2
Views: 21,646
|
Forum: General Forum
03-04-2007, 04:35 AM
|
Replies: 2
Views: 18,988
|
Forum: Reverse Code Engineering
03-03-2007, 04:24 AM
|
Replies: 7
Views: 10,114
|
Forum: Steganography + Cryptography
02-06-2004, 09:42 AM
|
Replies: 4
Views: 28,542
Ciao mala,
i use mainly VC++ and (GAGS- EO...
Ciao mala,
i use mainly VC++ and (GAGS- EO Evolutionary Computation Framework),
sometime i'v used also your same pattern (gcc+GALib).
I'm really intersted in GA applied to reverse 'n crypto. I agree...
|
Forum: Steganography + Cryptography
02-05-2004, 01:36 PM
|
Replies: 4
Views: 28,542
|
Forum: Steganography + Cryptography
01-03-2004, 01:04 PM
|
Replies: 2
Views: 24,765
|
Forum: General Forum
12-23-2003, 01:38 PM
|
Replies: 12
Views: 30,362
|
Forum: Steganography + Cryptography
08-30-2003, 03:13 PM
|
Replies: 9
Views: 29,272
Great article, this helped me on two situation...
Great article, this helped me on two situation
your 4 riddle
a riddle proposed by Ben in another place
Of course the article is intersting because gives some (vey clear) basics of Stego.
Ciao By...
|
Forum: Reverse Code Engineering
08-24-2003, 01:26 PM
|
Replies: 19
Views: 28,927
For ollydbg or other tools like SymbolLoader, I...
For ollydbg or other tools like SymbolLoader, I know the fs:[20h] trick
that is used to know if an application is executed by another programm. The fs:[20h] if i remember correctly is used to check...
|
Forum: Reverse Code Engineering
08-11-2003, 11:36 AM
|
Replies: 3
Views: 15,168
|