home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Reverse Code Engineering RCE CD +sandman 2000
/
ReverseCodeEngineeringRceCdsandman2000.iso
/
RCE
/
Stone
/
dos
/
xcomorup.txt
< prev
Wrap
Text File
|
2000-05-25
|
1KB
|
36 lines
Manually unpacking XcomOR v0.99i - Doc by Stone/UCF
There really is no need to write this doc - GTR already unpacks this and
so does a lot of other generic unpackers I suppose.
Anyways - this doc is more to get rid of my disappointment with this
encrypter.
1. Tools you need
- Windows 95
- WinIce 3.01 (no mods needed) - My debugger isn't modded!
2. Method
1. load the encrypted file with dldr
e.g. C:\siw95\util16\dldr xcommed.com
2. step one instruction: Press F10 - once
3. set a memory break point on execution at 100h
e.g. bpm cs:100 x
4. Let it run: press G
5. The debugger will break - press G
6. The debugger will break - disable your break point: BD 0
7. Step until you pass a "loop" instruction
e.g. press f10 twice
8. Re-enable your breakpoint: BE 0
9. Let it run - press G
10. You've succesfully unpacked the file - now dump it to the disk
This I'll leave you to figure out how :)
3. Discussion questions - answer this and you'll have understood the lecture:
Why do you wanna detect WinIce/Fuck with WinIce in
a comcrypter?
Enjoy... this was leeched from Stone's Homepage: www.one.se~/stone/index.htm
You may email me at: stone@one.se