Learning RE with HAWKE
In this post i will tell a simple reverse engineering with app called HAWKE.Which you can download from here.
- Sandwich.app
This simple objective-c application ask for simple serial code. After diassembly i found the validate class. The pseudocode for this class is below :
The important part is :
LOBYTE(eax) = 0x19c5 - (SAR(sum, 0x2)) == index3 ? 0x1 : 0x0;SAR is shift aritmetic right. It means the index3 must be equal to sum after shift right. Which i can write simple python code for it.
- Unicorn.app
- Fox.app
- Socks.app
Langganan:
Posting Komentar
(
Atom
)
Tidak ada komentar :
Posting Komentar