kcn278at March 23,2015 Good tutorial on the use of NOP. I never got to see it in action, but it is a common technique used by hacker to attempt to get unauthorized access. For example, buffer overflows, hackers can use the NOP slide to abuse poor programmed applications to get their malicious codes into the instruction memory where the victim's system will execute the hacker's codes. This tutorial is quite similar to that concept.
tristayifeiat April 16,2015 It is a very interesting video about Ollydbg showing a simple example of how to break into an encrypted program. For this use, I think it is very helpful when analyzing simple programs with password; however, on the other hand, this software can probably help hackers find the password and give them authorization for accessing the program, which should be unauthorized. I was wondering does it can find password for all simple programs? What is kind of programs can be applied?
DPerryat April 30,2015 Definitely a little hard to follow - but overall I think it would be easy to utilize. I think it will make for another great asset to use in the Computer Forensic field-tech toolkit.
connellytat May 02,2015 I think the video that Brian Hussey did on the Sony hack where he used Ollydbg was better than this series. In that video, he showed how it can be used to change malware so that it doesn't pause for 45 minutes. Some of these videos in this series are so blurry that they are hard to follow.
klevanat May 04,2015 @JSahm151 I agree that this tool is a little hard to get used to but it's still actually one of the well known windows debuggers (well free one's). I think another alternative is Immunity Degubber or IdaPro (there is a free version of this) but you need the pay version for full functionality.