• Content count

  • Joined

  • Last visited

Everything posted by thepcdude

  1. I've recently fell in love with IDA and all it's features. Renaming functions, variables, and offsets. The graph view is heavenly, and it's just an amazing program. But sometimes in the code I see an area like this: .text:0040159C var_54= dword ptr -54h .text:0040159C var_50= dword ptr -50h .text:0040159C var_4B= byte ptr -4Bh .text:0040159C var_4A= byte ptr -4Ah .text:0040159C var_49= byte ptr -49h .text:0040159C var_48= dword ptr -48h .text:0040159C var_44= dword ptr -44h .text:0040159C var_40= dword ptr -40h .text:0040159C var_3C= dword ptr -3Ch .text:0040159C var_38= dword ptr -38h .text:0040159C var_34= dword ptr -34h .text:0040159C var_30= dword ptr -30h .text:0040159C var_2C= dword ptr -2Ch .text:0040159C var_28= dword ptr -28h .text:0040159C var_24= dword ptr -24h .text:0040159C var_20= dword ptr -20h .text:0040159C var_1A= word ptr -1Ah .text:0040159C var_18= dword ptr -18h .text:0040159C var_13= byte ptr -13h .text:0040159C var_12= byte ptr -12h .text:0040159C var_11= byte ptr -11h .text:0040159C var_10= dword ptr -10h .text:0040159C var_C= dword ptr -0Ch .text:0040159C var_8= dword ptr -8 .text:0040159C var_4= dword ptr -4 .text:0040159C arg_0= dword ptr 8 .text:0040159C arg_4= dword ptr 0C And I'm wondering what this is. Any help would be appreciated. I <3 reversing
  2. Very neat!! This has always been EXACTLY the type of hacking I have wanted to learn but never could. I just can't wrap my head around on how to find the serial ports. xD
  3. Yeah. Also car whisperer still works, nothing quite like putting voices in peoples head while they wait for their coffee at Starbucks Yeah! That seems like a really neat tool! But I've never been able to get that working due to the lack of any documentation....
  4. Oh God, another programming language debate. And btw, I think you got it wrong. "Starting at C++ then moving onto something more advanced, like Java." That made me lol. Anyway, what kind of password cracking are you trying to do? If you're trying to, for example, write software that will unmask passwords in those "password" text boxes, then you need to learn about the Win32 API and the different types of Messages Controls send to the window, etc. If you're trying to write software that 'cracks' or 'generates' code, it's as simple as knowing how it was generated in the first place. You will need to reverse engineer the application that generates it. This requires a good knowledge of ASM, and debugging. Be a little more specific, and I will try to help your further.
  5. I loved Ronin. It's on Hulu if anyone wants to watch it.
  6. This actually happened to me and my friend maybe 6 years back. We overheard two chicks talking about the 'party' and how 'awesome it was'. I think it was due to the phones being on the same channel or frequency or whatnot. Not too into that stuff, maybe someone can disprove this theory?
  7. hahahahah Jean Reno ftw Just by chance, you do know that .gif is from "Ronin" right? What is Leon? O_o
  8. Of course you can decompile an executable, it just may not give code that is much easier to read than than disassembling it. Hex Rays puts out a C decompiler that attempts to map the disassembled code to the C language that it was compiled from. You wont get any of the variable names but for the most part it will give you valid C code including all the function names and make it a bit easier to read than assembly. Oooh yeesss! I forgot about that software. It's still nothing close to what decompilation of things like java is.
  9. .exe's aren't compiled into bytecode, so there is no way to get an even remotely good source code from it. You can't decompile exe's. ALTHOUGH You can dissasemble them. It will give you the Intel ASM instructions of it, and you can work from there. There also appears to be certain code segments in Delphi Executables. Read this article to learn more: If you need help on disassembling/reversing at all, feel free to PM me.
  10. I remember reading about a wire tap that was wireless. It was a small box with I think a coil of copper wire. You could simply open it, and snap it closed over a telephone wire. Then you could simply listen in on the call that way. Can anyone remind me what this was?
  11. Hahahahaha, that girl was hilarious. I like her.
  12. What is this Time Warner you speak of? Here in Chicago, only two dominate. And I believe they're literally the ONLY ISP's you can get apart from dial-up. Those are Comcast and AT&T. Both suck. *cries*
  13. AT&T just recently lowered my speed. And raised my price by $5. I DESPISE AT&T.
  14. There are always custom OS X discs out on the pirate seas. They are uploaded with appropriate kernels and drivers for either Intel or even AMD systems. And on top of that, Leopard was cut down on drivers and such to trim the size. So, out of the box, almost definitely not.
  15. Keygens and cracks hardly ever use the base, standard W32 dialogs. I was wondering how they make those cool dialogs, without the toolbar, etc. All custom buttons, etc. And another thing that is *really* puzzling me is how they fit like 2 minute songs into the file and it remains a couple kilobytes. Any help and info would be appreciated. Thanks.
  16. And Deepfreeze is a great tool too.
  17. Hahahahahahaha.

    Since when was VB such a prestigious language?

    lmfao, you grow out of that shit when you hit puberty.

  18. I read that today, great story. I recommend it!
  19. Oh, ok, this confirms my beliefs. Thanks! And I noticed that the keygen I'm looking at the source of right now uses a .xm media file for it's tune. It's a little over 2 minutes, and is 50kbs. Hmm.
  20. What is padding?
  21. I'm just curious, what steps did you take to gather this information? Did you decompile it somehow? The reason I ask is because I want to know how to do this myself. Set up a virtual machine to enclose the unwanted viruses. Then get some utilities to monitor the application. The best ones are Sysinternals. They allow you to monitor the process and all the files it reads/writes along with registry keys. Look into that. Then you can use a disassembler like IDA Pro to gain a fundamental understanding of the application. PEiD is also useful to detect if it's packed in any way, and trying to determine what language the application was written in.
  22. I'm guessing this scenario is very possible, but if you associate with an AP or put your card in monitor mode and just sniff, would you be able to get every one else's packets traveling through the air, and supplied with the WEP key, decrypt them and analyze anything cleartext in Wireshark for example? Would listening on the wireless interface (monitor) in Wireshark alone be sufficient?
  23. I'm having trouble seeing what actually is happening.
  24. VirtualDUB is GHASTLY. Dreadful dreadful editing software. It may have enough good features for a free program, but the UI SUCKS. You would be better off downloading some easy cheesy video mixer that achieves some nice effects. Try a trial maybe. Google up "best video editors" or something along those lines. Just find some software that is fully functional, but limited to 30 days. Just use it up and have fun.
  25. I heard people can use this as a DID, and as a VSP. Is this true? And how can I do it?