Crack complete entry, fourth chapter - Start with debugger and related tools

xiaoxiao2021-03-05  22

Before writing this chapter, I saw a tutorial to see the trend. I would like to refer to it, I suddenly discovered that a chapter wrote this is a very stupid thing because I think the use tutorial about these tools. I don't think you don't think you don't think you don't think you don't think it is. So I don't want to be a waste of time, this chapter is stranded.

Recommend "Crack Tutorial 2001", recommend "see the snow forum essence, two, three, four", recommend "encryption and decryption-software protection technology and complete solution", recommend to all the tutorials related to it.

This chapter addresses:

To go to the road, you should learn the following tools at least you should master the following tools:

Softice: The best tracking commissioning tool is currently recognized. (Due to the relationship between the resolution of I used, I never used it)

TRW2000: The Chinese is proud, including my favorite pmodule command. (Henan fellow, Yinxu old people)

W32DASM8.93 or any other version: Anti-assessment of the best tools.

HIEW or ULTRA EDIT or other: hexadecimal tools. Use Ultra Edit, WinHex, Hex Workshop, use Ultra Edit, WinHex, Hex Workshop, using HITRA EDIT, WINHEX, HEX WORKSHOP, and I personally like Ultra Edit.

Detection File Type Tools: such as TYP, GTW, or FileInfo, etc. This is a software that can detect your software is encrypted.

ProCDUMP with other N-fold shelling software.

Exescope: Have the resolution and display function of execution files (Exe, DLL, etc.); extract resources to external files; resource rewriting; record file records and its reputation (batch editing) and other functions. It is a common tool for Chinese software, and it is also useful when cracking software.

Many of many ... (waiting for you to learn after entering the door)

(Author Note: Method for the use of the above tools, most can be found in some tutorials, so he is not willing to pay)

转载请注明原文地址:https://www.9cbs.com/read-37754.html

New Post(0)