Archives For Reverse Engineering

This is a re-post or a post from 2010 on my old blog, ilsken.net

XOR ciphers become useful for example to hide text strings from plain view.

When encrypting, first xor and then swap the nibbles.
When decrypting, first swap the nibbles and then xor.

How it works Continue Reading…

This is a re-post of a post from 2007 taken from my old blog ilsken.net

If you’re a software-programmer and/or reverse-engineer you should know that using Windows API-calls is a easy way to write code, and also in many cases a good point for reverse-engineers to trace to/from while removing potential protections ..

Let’s take a basic example, let’s use a standard WinAPI-call.. Continue Reading…