Learning RE with HAWKE

Tidak ada komentar
In this post i will tell a simple reverse engineering with app called HAWKE.
Which you can download from here.


  1. Sandwich.app


    This simple objective-c application ask for simple serial code. After diassembly i found the validate class. The pseudocode for this class is below :
    The important part is :
    LOBYTE(eax) = 0x19c5 - (SAR(sum, 0x2)) == index3 ? 0x1 : 0x0;
    SAR is shift aritmetic right. It means the index3 must be equal to sum after shift right. Which i can write simple python code for it.


  1. Unicorn.app

  1. Fox.app

  1. Socks.app


Tidak ada komentar :

Posting Komentar