Some ideas for cracking

VB MASM32 vc bcb easy language Delphi VB cracking 1. Search for button events in VBExplorer 2. If there is a prompt box, bp rtcMsgBox 3. Use bp _ vbaStrCmp/_ vbaStrComp/_ vbaVarTstEq Bp _ vbaStrCmp Bp _ vbaStrComp 4. Universal breakpoint method

Anti-debugging logs starting from scratch

Author: tongyongmcI do not know what name should be appropriate, mainly for those who are preparing to debug the kernel ================= Programming environment ==================================VS2008 + DDK + VA + DDKWIZARD1. Install VS2008 and

Analysis of JIT layer shelling

Prepared by: chenxiaoluNow. the Net shell is getting stronger and stronger, and the current mainstream protection ideas are all based on the "method" layer. In the memory, we can no longer obtain the complete Assembly, even if the Dump is down, the

Armadillo (pangolin) Shell Analysis of a stock trading software

By lchhome1. First, use PEID to check the shell as Armadillo4.4x, and it is a dual-process shell.2. Ignore all exceptions with OD, hide OD, and load the program to open the bp OpenMutexA breakpoint under the command line. The interruption of Shift +

Crack the QQ ghost record viewer v9.32

This article is intended for beginners.This software is shelled. It is very easy to keep going. Soon you can get to oep and then shell it with the Od plug-in, After the shell is removed, it is now cracked.In fact, the most important thing to crack

Design defects of the integrated AES 256 bits Encrypted USB flash drive.

It is found that bypass is a hardware-Encrypted USB flash drive known as AES 256 bits produced by Integral by providing uninterrupted power supply. strictly speaking, this should be designed as a design defect. this encryption defect shows that once

Summary of anti-debugging technology in mealtime of Hack. lu

[0x01Background] I went to Hack a few days ago. lu, I have not made any questions because of my busy work. However, I feel that the questions are quite interesting. Although some questions are not difficult, they cover a lot of knowledge points,

The most comprehensive tutorial on encryption and decryption

Basic tutorialChapter 1 Rules1-1 PrefaceBefore learning how to decrypt data, you must understand what encryption is, how to encrypt data, and how to track programs. In this way, decryption is no longer a dream. Only DEBUG is used as a tool. COM, but

Discard the star client-crack the star rogue software

By: xpfoxChina Telecom in various regions is currently trying to promote the advertisement software developed by China Telecom, which is based on the sky. Taking a closer look, he is useless to improve user security!In this case, the PPPoE dial-up

Arial CD Ripper V1.4.0 Registration Algorithm Analysis

[Author mailbox]: gb_1227@163.com [Software name]: Arial CD Ripper V1.4.0 [Software size]: 1898 KB [Software language]: English [Software type]: foreign software/shared edition/audio conversion [Sorting time ]: []:

Attackers can exploit the local vulnerability to execute arbitrary code.

Abstract:At present, the use of LFI vulnerabilities on the network is scattered, many of them are also very simple, and no examples are provided. Based on the summary of other people's papers, this article adds some practical demonstration examples

A hacker's navigation station in a simple day

Www.2cto.com.Author: StrikerQQ: 954101430Blog: StrikerSB.com Body:Actually, I saw the log of the Net user space =. = So I tried it and I had the following story. First, I saw the website and directly looked at the side note. I personally feel that

CSRF account hijacking in CSRF

Because the webpage form verification is not strict, malicious user information can be submitted. A function in the Website user panel is to change the user email address. This form can be maliciously submitted not to the current user's email

Shunfeng's SQL Injection

SF preferred home: http://www.sfbest.com injection point address: http://home.sfbest.com/order/viewproduct/id/56455/ 1: the whole station did not look carefully, but worried about elsewhere there are also injection, or Self check it again. Case 2:

Solution to Chinese garbled characters during basic verification

Recently, Basic Authentication phishing is very popular, but garbled code is always a problem. After testing, there are two solutions: Method 1: manually analyze the Request header. If the client accepts WWW-AuThenticate authentication, the Request

Using post in the Ecshop background getshell Method

Admin/template. phpif ($ _ REQUEST ['ac'] = 'Update _ library '){Check_authz_json ('library _ manage ');$ Html = stripslashes (json_str_iconv ($ _ POST ['html ']);$ Lib_file = '.. /themes /'. $ _ CFG ['template']. '/library /'. $ _ POST ['lib']. '.

How hackers intrude your website

This question is hard to answer,To put it simplyThere are many ways to intrude into a website. This article aims to demonstrate common website scanning and intrusion technologies used by hackers.Suppose your site is: hack-test.comLet's ping this

VbSEO-From XSS to Reverse PHP Shell

XSS is not a big deal, or is it? On your occasions, I 've seen this vulnerability being classified as useless, not serious, and being a low threat. what I 've always had in mind is that it's only the capabilities of the browser, and the hackers mind

Call the remote path to execute CMD

Is this the case when a VM raises the right "? Most of the reasons are a function of coffee, which allows only specific directories to execute programs, such as (c: \ progra ~ 1 and c: \ windows \ system32 \) execute programs in these directory

Analysis of Several flash xss vulnerabilities

Vulnerability 1: Parameters. getInstance (). data = loaderInfo. parameters; public function get onPlayStart (): String {return (_ data ["onPlayStart"]);} ExternalInterface. call (Parameters. getInstance (). onPlayStart, _ arg1); ExternalInterface.

Total Pages: 1330 1 .... 1296 1297 1298 1299 1300 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.