Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ollydbg Tutorial #5 - Basic Software Cracking

 

Rating :

 

Comments

 
  • jczarny
    jczarny at May 06,2015
    I think I have awhile until I start messing with OllyDebug on a regular basis, but the capabilities look very interesting. Definitely might come in handy for malware analysis if you were trying to patch the malware to work a certain way. For now, maybe I can just use it to bypass all passwords on my home PC.
  • logybomb
    logybomb at July 18,2015
    Cool hack, I wonder what types of applications and OS's this will work on. What if the applications validates user credentials from a remote server? This would be an excellent tool to test software applications with.
  • randerson0
    randerson0 at July 22,2015
    This was pretty cool. I would have liked to know more about how the software works. This software seem to be an interesting way to look at code. It could be used for reverse engineering.
  • hpasekov
    hpasekov at July 23,2015
    I have not heard about this program before. It sounds very interesting because it has many uses; from enabling programmers to see if their program will work as intended, through password and application cracking, to reverse engineering and malware analysis.
  • aholcom2
    aholcom2 at September 04,2015
    I have used Ollydbg a few times (still very new at it) and this was a good very basic tutorial on to use it. It would have been nice to know a little bit more about all the options Ollydbg has as it’s a little bit hard to use. Hopefully in the future videos the person can give more in depth descriptions how to use Ollydgb and explain all of its options/functions.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved