Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > File Unpacking
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 03-27-2016, 10:13 AM
Abg_Beca Abg_Beca is offline
Member
 
Join Date: Nov 2009
Posts: 16
Default How to Break at OEP

if the OEP is believed to be at 0x60D35A ,
how to load the program and stop at that OEP using OllyDbg?
the program is packed using HASP HL

Thank you
Reply With Quote
  #2  
Old 04-29-2016, 04:34 AM
user1 user1 is offline
Senior Member
 
Join Date: Jun 2011
Posts: 283
Smile

you tried unpack?
__________________
dongle backup
Reply With Quote
  #3  
Old 04-29-2016, 02:58 PM
Larry Larry is offline
Member
 
Join Date: Oct 2008
Posts: 23
Send a message via ICQ to Larry
Default

Abg_Beca, press Ctrl+G, enter address 60D35A, click right-mouse button and set the option Breakpoint -> Hardware, on execution. Then run the target.
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.