-
-
ARTeam: news online..
-
发表于: 2006-10-8 04:51 2509
-
Hi all,
there are few news from us:
First of all two new tutes:
HASP SL a deeper dig by potassium
In my previous tutorial1 on HASP SL (6.41.95) I demonstrated how to easily find the OEP, dumping and rebuilding of the target application. The main goal of this tutorial is to do a little more in-depth analysis, how to manually bypass the anti-debug feature and finding out what version you are dealing with etc. Also this tutorial includes a flash-movie of the manual handy work described in this tutorial. Dodging the anti-debug, finding OEP, dumping and rebuilding. All done in about 2.5 minutes!
Ring0 Crackme Explained by deroko
[I]This time, in new article, I’m not going to talk about any comercial protection, this tame I will talk about one interesting crackme from www.crackmes.de which was submitted by Ms-Rem. This crackme has a lots of nice features that make it very very interesting, some of them are IDT/SDT hooks, rootkit tricks to hide process, usage of \Device\PhysicalMemory, 2 process execution, APC,
etc…
In this tutorial I’ll cover most of stuff handled by crackme and show you my steps for bypassing it.[/I]
Second there's a new trial member: arjuns
And third, he just released in our releases pages a new gold version of his famous Olly Tool Bar.
http://arteam.accessroot.com
have phun,
Shub
there are few news from us:
First of all two new tutes:
HASP SL a deeper dig by potassium
In my previous tutorial1 on HASP SL (6.41.95) I demonstrated how to easily find the OEP, dumping and rebuilding of the target application. The main goal of this tutorial is to do a little more in-depth analysis, how to manually bypass the anti-debug feature and finding out what version you are dealing with etc. Also this tutorial includes a flash-movie of the manual handy work described in this tutorial. Dodging the anti-debug, finding OEP, dumping and rebuilding. All done in about 2.5 minutes!
Ring0 Crackme Explained by deroko
[I]This time, in new article, I’m not going to talk about any comercial protection, this tame I will talk about one interesting crackme from www.crackmes.de which was submitted by Ms-Rem. This crackme has a lots of nice features that make it very very interesting, some of them are IDT/SDT hooks, rootkit tricks to hide process, usage of \Device\PhysicalMemory, 2 process execution, APC,
etc…
In this tutorial I’ll cover most of stuff handled by crackme and show you my steps for bypassing it.[/I]
Second there's a new trial member: arjuns
And third, he just released in our releases pages a new gold version of his famous Olly Tool Bar.
http://arteam.accessroot.com
have phun,
Shub
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
赞赏
他的文章
- [求助][ARTeam] Analyzing an Adobe Flash Malware (CVE-2011-2110) by +NCR/CRC! 6399
- [原创]ARTeam: new forum 2387
- [原创]ARTeam: Swimming into Trojan and Rootkit GameThief.Win32.Magania Hostile Code 1793
- [原创]ARTeam: [ARTUT] Introduction To Malware Techniques and Logics Part 1 2772
- [原创]ARTeam: Armag3ddon 1.6f by condzero 4871
看原图
赞赏
雪币:
留言: