mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2026-01-08 16:54:25 +01:00
Update re102_section5.2.md
This commit is contained in:
@@ -50,7 +50,8 @@ At the very end of the function it jumps to `loc_404777` where it calls `sub_403
|
||||
|
||||
If you follow the stack argument DWORD in the dump you can see the full strings. To view this, right click on the stack argument and select **Follow DWORD in dump**.
|
||||
|
||||

|
||||
*Click to Enlarge*
|
||||
[](https://securedorg.github.io/RE102/images/Section5.2_hardwarestrings.png)
|
||||
|
||||
Open regedit.exe in Windows and verify that this registry key exists under HKEY_LOCAL_MACHINE. If this key exists RegOpenKeyEx will return 0, if not 2. In the debugger, Step over **F8** this function call. Fortunately this VM was built with an IDE instead of scsi hardware. You can verify this by looking at Virtualbox’s storage settings.
|
||||
|
||||
@@ -164,4 +165,4 @@ After DeviceIOControl is called do not take the jump after at `00405778` or `loc
|
||||
|
||||
This jump should land you at `loc_402192` or `00402192`. **Congratulations!** You have made it past several VM evasion techniques. The next section will go over identifying a packer.
|
||||
|
||||
[Section 5.1 <- Back](https://securedorg.github.io/RE102/section5.1) | [Next -> Section 6](https://securedorg.github.io/RE102/section6)
|
||||
[Section 5.1 <- Back](https://securedorg.github.io/RE102/section5.1) | [Next -> Section 6](https://securedorg.github.io/RE102/section6)
|
||||
|
||||
Reference in New Issue
Block a user