Archives For Reverse Engineering

This is a re-post or a post from 2010 on my old blog,

XOR ciphers become useful for example to hide text strings from plain view.

When encrypting, first xor and then swap the nibbles.
When decrypting, first swap the nibbles and then xor.

How it works Continue Reading…

This is a re-post of a post from 2007 taken from my old blog

If you’re a software-programmer and/or reverse-engineer you should know that using Windows API-calls is a easy way to write code, and also in many cases a good point for reverse-engineers to trace to/from while removing potential protections ..

Let’s take a basic example, let’s use a standard WinAPI-call.. Continue Reading…

Incoming search terms:

  • https://yandex ru/clck/jsredir?from=yandex ru;search;web;;&text=&etext=1824 zebxHqGTMOwuBOs98VGykj55z_-qJlsp9h74cA44d-M 1430edc05df7046449c8e13eaa6cd7338a724965&uuid=&state=_BLhILn4SxNIvvL0W45KSic66uCIg23qh8iRG98qeIXmeppkgUc0YMIVJNtoWDTa6C
  • https://yandex ru/clck/jsredir?from=yandex ru;search;web;;&text=&etext=1831 hMJIIcPCnyegJHTZHIF0JEREngfVHkJu-a4sTvN_6E0 1488aecb2a83a3a94f013a7dedf68020cd742785&uuid=&state=_BLhILn4SxNIvvL0W45KSic66uCIg23qh8iRG98qeIXmeppkgUc0YGftRg9cP1erjB