flat assembler
Message board for the users of flat assembler.
![]() |
Author |
|
Overflowz 23 Oct 2012, 23:52
Hi, I was just thinking and tried to do it like a challenge for me, but I got no success. Is there anyway to check self CRC of executable file? Thanks!
|
|||
![]() |
|
r22 25 Oct 2012, 13:55
On windows, imagehlp.dll MapFileAndCheckSum function
http://msdn.microsoft.com/en-us/library/windows/desktop/ms680355%28v=vs.85%29.aspx |
|||
![]() |
|
hopcode 30 Oct 2012, 02:37
the algo
http://www.mail-archive.com/cryptopp-users@googlegroups.com/msg03491.html it may be SSE eligible, Cheers, _________________ ⠓⠕⠏⠉⠕⠙⠑ |
|||
![]() |
|
Overflowz 01 Nov 2012, 23:27
Thanks for reply. I think the best method to check CRC is to start checking from PE header to forward..
|
|||
![]() |
|
baldr 21 Nov 2012, 16:32
DOS386 wrote: Sure ... walk through the memory, peek the Byte's and feed them into the CRC-32 algo ... skip last 4 Byte's holding the should-value. |
|||
![]() |
|
Bargest 21 Nov 2012, 17:12
Code that counts and checks CRC must be protected by obfuscators or virtualizators, otherwise it will be easy to fill this code by NOPs, change should-value to another or just change "jnz" to "jz"
![]() |
|||
![]() |
|
revolution 22 Nov 2012, 01:46
Bargest wrote: Code that counts and checks CRC must be protected by obfuscators or virtualizators, otherwise it will be easy to fill this code by NOPs, change should-value to another or just change "jnz" to "jz" |
|||
![]() |
|
Overflowz 26 Nov 2012, 14:33
I wonder how digital signatures work.. aren't they just full check itself with any hash algo?
|
|||
![]() |
|
revolution 26 Nov 2012, 14:38
Signatures use public key crypto to sign a hash. The OS will have the public keys to check the signature. The private keys are held by the OS maker, or can be a self generated set of keys if you only need stuff working on your own systems.
|
|||
![]() |
|
< Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2023, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.