Explanation of OllyDbg

As in the previous tutorial, OllyDbg is a debugger program which is quite popular among the search / cracker serial number :)
Just listened to the explanation immediately.
we try to directly attach the file which we will exploit warftpd :)
attach a position to do while running the application warftpd, to open himself made directly to the file .exe


 

ESI and EDI are the "Index Register". These registers are used as a pointer to a location in memory and is typically used for operations - String operations.

EBP and ESP are the "Pointer Register". The second register is coupled with the SS register.
If the ESP (Stack Pointer) register pairs with SS (ESP: SS) is used to designate the address on the Stack
while EBP (Base Pointer) will be paired with the SS register (EBP: SS) to refer to the memory address where data.

EIP is a "Pointer Index Register" is paired with the CS (CS: EIP) to refer to the memory address where the next command will be executed.

The following are the display when attach OllyDbg Warftpd

 

Comments

Popular posts from this blog

Introduction Maltego

EXE file structure