reverse engineering - how to unpack a dll file which is UPX packed but also the headers are changed? -



reverse engineering - how to unpack a dll file which is UPX packed but also the headers are changed? -

i have file upx packed. there way can alter headers , still find upx packed? , how unpack ? tried lot of tutorials , fed explain same method doesnt work me. same problem mentioned in next : http://www.reteam.org/board/showthread.php?t=2670 not versed reverse engg.. :( jst noob .. ideas helpful.

to find packing, utilize peid, protectionid etc.

for correcting headers, need open file in hexeditor , prepare offsets in binary manually. utilize upx.exe file decrypt

upx -d

reverse-engineering pe packing upx

Comments

Popular posts from this blog

How do I check if an insert was successful with MySQLdb in Python? -

delphi - blogger via idHTTP : error 400 bad request -

postgresql - ERROR: operator is not unique: unknown + unknown -