mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-23 08:54:23 +01:00
adding restart button
This commit is contained in:
@@ -39,7 +39,8 @@ You will need to sync the debugger and disassembler addresses so you can follow
|
|||||||
|
|
||||||
### XOR Decode Function
|
### XOR Decode Function
|
||||||
|
|
||||||
Remember use the F2(breakpoint), F7(Step Into), F8(Step Over), F9(Run) keys to navigate through the debugger.
|
Remember use the F2(breakpoint), F7(Step Into), F8(Step Over), F9(Run) keys to navigate through the debugger. If you accidentally run past the end the of the program you can always restart by clicking .
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
In **IDA**, get the offset of the XorDecode function you saved prior.
|
In **IDA**, get the offset of the XorDecode function you saved prior.
|
||||||
|
|||||||
BIN
images/restart.png
Normal file
BIN
images/restart.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 5.5 KiB |
@@ -117,7 +117,7 @@ We can assume that this function is doing some kind of Xor encoding. So let's re
|
|||||||
|
|
||||||
Let's use the tool **XORSearch** to see if we can find some interesting xor decoded strings. Open the terminal **cmd.exe** from the start bar, and navigate to the XORSearch.exe
|
Let's use the tool **XORSearch** to see if we can find some interesting xor decoded strings. Open the terminal **cmd.exe** from the start bar, and navigate to the XORSearch.exe
|
||||||
|
|
||||||
```XORSearch.exe <Path to Unknown.exe> "A string to test"```
|
```XORSearch.exe <Path to UnknownUnpacked.exe> "A string to test"```
|
||||||
|
|
||||||
*Click Image to Enlarge*
|
*Click Image to Enlarge*
|
||||||
[](https://securedorg.github.io/images/static6.png)
|
[](https://securedorg.github.io/images/static6.png)
|
||||||
|
|||||||
Reference in New Issue
Block a user