Cracking in Assembler

When I was learning Reverse Engineering, I had to learn Assembler and start to use the tools, like IDA Disassembler and Softice,  among many others. Here is an listing of the process to identify where in the program it is used a password, and how to jump the control step in the assembler code.
Also see:

Leave a Reply

Your email address will not be published. Required fields are marked *