![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#11
|
|||
|
|||
![]() yes. I'm talking about the mmx part. It says that I have to do it for codeveil 1.2 just not for 1.3. O.K. if I don't have to do it for 1.2... I really don't know where to go from here. I'm really sorry for being such a nOOb. When I get good I promise to help someone else. It has a time 30 trial. You know of any tutorials on how to remove it or of what's my next move?
|
#12
|
|||
|
|||
![]() Hi Sir, could you please help me reverse something? I think the code is somehow encrypted and all I gets after reflection is
"Expression stack is empty at offset 0006." or "/* Stack is empty at 0006 at x25adc2ca6f05c4e5.x2637e979e1ce20a0.x47c79a4d20718 3de() at x25adc2ca6f05c4e5.x2637e979e1ce20a0.xf7ed8b5d3a356 83b(Int32 xdadd3e52ec363720) at x25adc2ca6f05c4e5.x2637e979e1ce20a0.xcca310a929e46 a7c(Int32 x13d4cb8d1bd20347, Int32 x2832f35f9e73679f) at x25adc2ca6f05c4e5.x2637e979e1ce20a0.x4c429db7bb96c 78c(xe4f1947afbf9c52f x1306445c04667cc7) at xb03536b881c730ad.x80decb06b0b136f1.x4c429db7bb96c 78c() at xb03536b881c730ad.xc5f99dd440b2d1db.x1be9855bf968d ec6(BinaryReader xe134235b3526fa75) */" Could you please help? Any ideas? Thanks! Quote:
|
#13
|
|||
|
|||
![]() Quote:
How am I supposed to help you ? :-[
__________________
Life can only be understood backwards but It must be read forwards. |
#14
|
|||
|
|||
![]() By the format of the obfuscated members name (the "x" at the beginning followed by an hex string), I think this assembly is most probably obfuscated by Xenocode PostBuild.
|
#15
|
|||
|
|||
![]() Hi Pros,
hats off to all senior RCE pros over here, and thanks a ton for the learnings offered to amateur like... here come my long time kept query, In a situation where as a Single MSIL Executable contains both Managed and UnManaged Code, in this case reversing of Managed Code is as simple as reversing a pure managed code with Reflector but how it is to reverse the UnManaged Code Chunks from that Mixed Executable... It would be greatfull to see a tutorial on this... Here is the link containing sample mixed code. http://rapidshare.com/files/145118471/RxSpiy.rar.html Thanks again Pros... do keep flying... |
#16
|
|||
|
|||
![]() Is there a solution for XHEO licensing (not Codveil).
I mean the other product of this company named Deploy LX Licensing ?! BR Shahram |
#17
|
|||
|
|||
![]() I meet the same question, how to Solve it ,Maybe someone could get the help!/*
Stack is empty at 0006 在 x25adc2ca6f05c4e5.x2637e979e1ce20a0.x47c79a4d20718 3de() 在 x25adc2ca6f05c4e5.x2637e979e1ce20a0.xf7ed8b5d3a356 83b(Int32 xdadd3e52ec363720) 在 x25adc2ca6f05c4e5.x2637e979e1ce20a0.xcca310a929e46 a7c(Int32 x13d4cb8d1bd20347, Int32 x2832f35f9e73679f) 在 x25adc2ca6f05c4e5.x2637e979e1ce20a0.x4c429db7bb96c 78c(xe4f1947afbf9c52f x1306445c04667cc7) 在 xb03536b881c730ad.x80decb06b0b136f1.x4c429db7bb96c 78c() 在 xb03536b881c730ad.xc5f99dd440b2d1db.x1be9855bf968d ec6(BinaryReader xe134235b3526fa75) */ |