0nion Posted June 12, 2016 Share Posted June 12, 2016 A reference from "black hat' movie 2015. The hacker cracks Encrypted code. How a malware has Encrypted code ended in ? And how to crack that ? Any information or tutorial or article would be appreciated. I do reverse engineer using IDA pro ( static analysis ). Link to comment Share on other sites More sharing options...
crystalboy Posted June 12, 2016 Share Posted June 12, 2016 OT: Was not a great film by the way, they can do it a lot better! Not only malware but also normal application can contain encrypted code. How to reverse engineering them? A lot depends on the technique that was used for encryption but as you can think, if the software run then can be reversed. Usually the decryption routine is inside the code so it can be traced, when you have the key to decrypt the code all become easy. What are you trying to accomplish? You can take a look (it is not encryption but the concept is the same) at: https://tuts4you.com/download.php?view.2989 https://tuts4you.com/download.php?view.3576 crystalboy 1 Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now