Explanation of OllyDbg

As in the previous tutorial, OllyDbg is a debugger program which is quite popular among the search / cracker serial number :)
Just listened to the explanation immediately.
we try to directly attach the file which we will exploit warftpd :)
attach a position to do while running the application warftpd, to open himself made directly to the file .exe


 

ESI and EDI are the "Index Register". These registers are used as a pointer to a location in memory and is typically used for operations - String operations.

EBP and ESP are the "Pointer Register". The second register is coupled with the SS register.
If the ESP (Stack Pointer) register pairs with SS (ESP: SS) is used to designate the address on the Stack
while EBP (Base Pointer) will be paired with the SS register (EBP: SS) to refer to the memory address where data.

EIP is a "Pointer Index Register" is paired with the CS (CS: EIP) to refer to the memory address where the next command will be executed.

The following are the display when attach OllyDbg Warftpd

 

Comments

Popular posts from this blog

Introduction Maltego

WAR-FTPD & Exploits (2)