Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ollydbg Tutorial #6 - Basic Software Cracking

 

Rating :

 

Comments

 
  • Ahmed
    Ahmed at February 20,2015
    ollydbg is a very great peace of software as long as you use it the legal way it's great for pen testing, reverse engineering and malware detection.lots of programming in the background with a simple GUI.
  • Ahmed
    Ahmed at February 20,2015
    ollydbg is a very great peace of software as long as you use it the legal way it's great for pen testing, reverse engineering and malware detection.lots of programming in the background with a simple GUI.
  • kcn278
    kcn278 at March 23,2015
    I have never used ollydbg, but its quite interesting. This is an interesting loophole. Since im not familiar with this program I am assuming it shows the code logic of application files when dragged into ollydbg. This would mean that theres a loophole in the programmers code logic. If somehow the programmer can patch his/her program by not displaying the string of both the user's input and the actual password when program is in execution then it could prevent this loophole.
  • dmoraval
    dmoraval at March 25,2015
    This second part explains how to crack a password. This utility helps you to get a password from an application. It will useful for an investigation where you do not know it.
  • JSahm151
    JSahm151 at March 30,2015
    This is a very interesting video about software cracking. I can see how this tool could be used for the wrong reasons. I would like to learn about other similar tools to this one for analyzing code.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved