There, I fixed your post.Quote:
Originally Posted by Zarathu [Dear Guest/Member you have to reply to see the link.click here to register]
Printable View
There, I fixed your post.Quote:
Originally Posted by Zarathu [Dear Guest/Member you have to reply to see the link.click here to register]
I've done a lot of cryptography as well as A.I.Quote:
Originally Posted by Aegis [Dear Guest/Member you have to reply to see the link.click here to register]
Actually, I had a lab in computer science last week in which I had to do some A.I. -- It was pretty cool.
(Cryptography, though, is a ****ing pain in the ass. I remember trying to decrypt MD5 hashes. :lol:)
SQL is not on the list, but from what I understand the Access class goes into Microsofts version of SQL. And as far as Visual Basic goes I already took it and passed it with an A. I was trying to be a smart ass, but its hard to do thru text.Quote:
Originally Posted by Zarathu [Dear Guest/Member you have to reply to see the link.click here to register]
Do you know ASM? I'm learning it now and I need some help. I disassembled the IE7 installer and I'm trying to recompile it without validation, but I'm stuck on a certain part.Quote:
Originally Posted by jurupa [Dear Guest/Member you have to reply to see the link.click here to register]
Math is a good minor with Computer Science as your major. You be much better off with math being a minor if your going to any area that requires math skills. Math as a major is stupid unless you want to teach it, or join a think tank.Quote:
Originally Posted by Aegis [Dear Guest/Member you have to reply to see the link.click here to register]
Zarathu - I never played with ASM, nor do I have the skill set for it. But I have played around with HEX code tho, I am not that good with it tho. But you may want to look at the hex code of the installer first before you decompile it, besides do a packet trace and look at the packet it sends out to make sure the os is legit. That would also help you as well.
Hmm? What do you mean? Just looked at the hex isn't going to help me. Hex is good if I want to do this:Quote:
Originally Posted by jurupa [Dear Guest/Member you have to reply to see the link.click here to register]
^ As it would then execute the shellcode (don't try it, the shellcode will only work on Linux).Code:char shellcode[] =
"\xeb\x2a\x5e\x89\x76\x08\xc6\x46\x07\x00\xc7\x46\x0c\x00\x00\x00"
"\x00\xb8\x0b\x00\x00\x00\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80"
"\xb8\x01\x00\x00\x00\xbb\x00\x00\x00\x00\xcd\x80\xe8\xd1\xff\xff"
"\xff\x2f\x62\x69\x6e\x2f\x73\x68\x00\x89\xec\x5d\xc3";
int main() {
int *ret;
ret = (int *)&ret + 2;
(*ret) = (int)shellcode;
return (0);
}
I disassembled it into the pure assembler. What can I do with the hex? I have a program that'll do it, just not sure what I can do.
Hex programs allow you to see memory address locations, which is useful for finding PC game cheats, as well as working on ASM as your on the hardware level.Quote:
Originally Posted by Zarathu [Dear Guest/Member you have to reply to see the link.click here to register]
Hex programs allow you to see this:Quote:
Originally Posted by jurupa
[Dear Guest/Member you have to reply to see the link.click here to register]
^ And that does nothing for me. The same application, disassembled, however, gives this:
[At least, that segment of the ASM. Why would I need memory addresses?]Code:mov edx, [ebp+0ch]
lea ecx, [ebp-24h]
mov [ebp-18h], esi
mov [ebp-1ch], esi
mov [ebp-24h], esi
mov [ebp-34h], esi
mov [ebp-44h], esi
call dword ptr [__vbaStrCopy]
mov ebx, [ebp+10h]
mov edi, dword ptr [__vbaLenBstr]
mov edx, [ebx]
push edx
call edi
mov esi, eax
mov eax, [ebp-24h]
push eax
call edi
cmp esi, eax
jg loc_00402494
lea edx, [ebp-44h]
push esi
lea eax, [ebp-34h]
lea ecx, [ebp-24h]
push edx
push eax
mov [ebp-3ch], ecx
mov dword ptr [ebp-44h], 4008h
call dword ptr [MSVBVM60::ord_619]
lea ecx, [ebp-34h]
push ecx
call dword ptr [__vbaStrVarMove]
mov edx, eax
lea ecx, [ebp-18h]
call dword ptr [__vbaStrMove]
lea ecx, [ebp-34h]
call dword ptr [__vbaFreeVar]
mov edx, [ebp-18h]
mov ecx, [ebp+14h]
mov eax, [ebx]
push edx
mov edx, [ecx]
push eax
push edx
call dword ptr [__vbaStrComp]
neg ax
sbb eax, eax
inc eax
neg eax
mov [ebp-1ch], eax