WARNING: The forum is now in read-only mode as we will soon be transitioning to different forum software. Feel free to join our Discord server in the meantime.

-

User avatar
warrantyvoider
Posts:4
Joined:Fri Dec 13, 2013 12:12 am
Re: Bettlefold 3 code unnecessarily complex

Thu May 22, 2014 2:43 am

@Muntaqim, dunno how much you know about reversing stripped/packed executables, but here some thoughts I had reading this:
1. if you can attach ollydbg at some point to the game (even protection against attaching is hackable) you can simply dump the UNPACKED memory back into PE format (it has some plugins for this)
2. I cant remember where I have seen it, but there are profiling programs that can trace in what order what memory location is accessed and by making a nice graph out of it, you see where heavy used functions are, or if its "unpacking" something (from files f.e.)
3. any executable has to use some system APIs to do stuff on your pc, so a good idea is usually to start hook/detour them and have some "debug points", like f.e. file access, networking, stringhandling, etc
4. finding cryptoalgorithm and libs that are used for that usually have functions that can be hooked to get data BEFORE its encrypted
5.dunno, theres more, but its 4 in the morning, brain goes... :D

greetz WV

User avatar
Kerrigan
Posts:1614
Joined:Mon Dec 17, 2012 6:15 pm
Location:Your nightmares

Re: Bettlefold 3 code unnecessarily complex

Thu May 22, 2014 6:40 am

warrantyvoider wrote:@Muntaqim, dunno how much you know about reversing stripped/packed executables, but here some thoughts I had reading this:
1. if you can attach ollydbg at some point to the game (even protection against attaching is hackable) you can simply dump the UNPACKED memory back into PE format (it has some plugins for this)
2. I cant remember where I have seen it, but there are profiling programs that can trace in what order what memory location is accessed and by making a nice graph out of it, you see where heavy used functions are, or if its "unpacking" something (from files f.e.)
3. any executable has to use some system APIs to do stuff on your pc, so a good idea is usually to start hook/detour them and have some "debug points", like f.e. file access, networking, stringhandling, etc
4. finding cryptoalgorithm and libs that are used for that usually have functions that can be hooked to get data BEFORE its encrypted
5.dunno, theres more, but its 4 in the morning, brain goes... :D

greetz WV


As far as i can judge it he hasn't any knowledge about RE.
He is just posting random thoughts about how the BF3 campaign is linked to actual people in Iran...

Return to “General Discussion”

Who is online

Users browsing this forum: No registered users and 9 guests