المشاركات : 857
المواضيع : 90
الإنتساب : Jan 2019
السمعة :
25
الإعجاب المعطى : 1256
الإعجاب المحصل : 2396
(09-01-2024, 06:17 AM)ROZBUD كتب : The main benefit here, is that RozDll break the protection without real/physical patching or affecting/touching the target
Can you please give us a practical insight on how to do this without the use of any tools. I mean, explain please your technique. However, a step by step video tutorial on how to achieve this will be very beneficial. In addition to this I am also eager to see your method of delaying the patching in the memory.
____________________________________________
I AM RETIRED DO IT YOURSELF
اخيكم في الله معتزل فلاتنسوه من دعوة صالحة فقد ظلم نفسه اسال الله ان يغفر لي ولكم ماتقدم وماتاخر
المشاركات : 163
المواضيع : 28
الإنتساب : Apr 2019
الإعجاب المعطى : 90
الإعجاب المحصل : 394
09-01-2024, 12:00 PM
(آخر تعديل لهذه المشاركة : 09-01-2024, 12:03 PM بواسطة ROZBUD.)
(09-01-2024, 09:44 AM)Newhak كتب : Can you please give us a practical insight on how to do this without the use of any tools
Dear Newhak
As I promised you, in the next Tutorial, I'll explain the last update (Dll to Dll) with a practical example, however if you are looking for the method used, then, I find this difficult to explain as it involves huge operations between C/C++ Code & API functions which related to Memory Access, Smart Pointers & Process Operations
المشاركات : 857
المواضيع : 90
الإنتساب : Jan 2019
السمعة :
25
الإعجاب المعطى : 1256
الإعجاب المحصل : 2396
09-01-2024, 12:34 PM
(آخر تعديل لهذه المشاركة : 09-01-2024, 01:00 PM بواسطة Newhak.)
(09-01-2024, 12:00 PM)ROZBUD كتب : As I promised you, in the next Tutorial, I'll explain the last update (Dll to Dll) with a practical example
I am not only interested in applying DLL to DLL patching as it is, at the end of the day, someting running in hidden. i.e. it's rather at most a use of your tool without understading the technique itself. However, I know that you maybe hooking some API's such as MapViewOfFile or some others and probably you export a certain chunk of code to a temporary location in the dynamic memory, and delay the patching until a certain time when you apply your patch. But I think there's no harm to explain at least how to do this without going into a hassle process of coding, Sorry to say this will not be RE otherwise, my friend
Please do not get me wrong as I greatly appreciate your work. Your tool is indeed powerful and invaluable and will significantly alleviate the patching of protected app's but I am a different person who cannot just follow some instructions in using any RE tools blindly, I am rather very meticulous about the concepts. Finally, my deer brother don't give me a fish but teach me how to fish, RE is teaching and learning support but not cracking only
____________________________________________
I AM RETIRED DO IT YOURSELF
اخيكم في الله معتزل فلاتنسوه من دعوة صالحة فقد ظلم نفسه اسال الله ان يغفر لي ولكم ماتقدم وماتاخر
المشاركات : 163
المواضيع : 28
الإنتساب : Apr 2019
الإعجاب المعطى : 90
الإعجاب المحصل : 394
09-01-2024, 04:27 PM
(آخر تعديل لهذه المشاركة : 09-01-2024, 08:19 PM بواسطة ROZBUD.)
(09-01-2024, 12:34 PM)Newhak كتب : "the technique itself..."
Done
Thanks
أعضاء أعجبوا بهذه المشاركة : Newhak
المشاركات : 11
المواضيع : 0
الإنتساب : Sep 2022
السمعة :
0
الإعجاب المعطى : 10
الإعجاب المحصل : 3
@rozbud can you make a short video how to use your tool when target protected by vmp
أعضاء أعجبوا بهذه المشاركة :
المشاركات : 163
المواضيع : 28
الإنتساب : Apr 2019
الإعجاب المعطى : 90
الإعجاب المحصل : 394
(09-01-2024, 04:30 PM)Hacknew كتب : @rozbud can you make a short video how to use your tool when target protected by vmp
المشاركات : 11
المواضيع : 0
الإنتساب : Sep 2022
السمعة :
0
الإعجاب المعطى : 10
الإعجاب المحصل : 3
So I have to unpack or don’t need unpack target ? So my language very poor !
أعضاء أعجبوا بهذه المشاركة :
المشاركات : 857
المواضيع : 90
الإنتساب : Jan 2019
السمعة :
25
الإعجاب المعطى : 1256
الإعجاب المحصل : 2396
09-01-2024, 05:43 PM
(آخر تعديل لهذه المشاركة : 09-01-2024, 05:50 PM بواسطة Newhak.)
(09-01-2024, 04:27 PM)ROZBUD كتب : don't give me a fish but teach me how to fish
قد وصلتني السمكة والبهارات وطريقة الاعداد فجزاك الله كل خير
(09-01-2024, 05:24 PM)Hacknew كتب : So I have to unpack or don’t need unpack target ? So my language very poor !
Bro, the answer was clear enough. You need to study your VMP protected app and locate where you want to patch it. Then fire up the ROZDLL and generate your hook. If still not clear please go back and watch some of the provided tut's on how to do it
____________________________________________
I AM RETIRED DO IT YOURSELF
اخيكم في الله معتزل فلاتنسوه من دعوة صالحة فقد ظلم نفسه اسال الله ان يغفر لي ولكم ماتقدم وماتاخر
المشاركات : 205
المواضيع : 22
الإنتساب : Aug 2019
السمعة :
11
الإعجاب المعطى : 591
الإعجاب المحصل : 461
(09-01-2024, 05:24 PM)Hacknew كتب : So I have to unpack or don’t need unpack target ? So my language very poor !
You have to run your VMP target on a debugger (be aware of antidebug tricks)
you dont need to unpack it physically, as it will be unpacked in memory at runtime anyway
locate the necessary patches on your target
fireup RozDll and follow the instructions on the video tutorials.
good luck
المشاركات : 11
المواضيع : 0
الإنتساب : Sep 2022
السمعة :
0
الإعجاب المعطى : 10
الإعجاب المحصل : 3
It is very complex with me sorry about that if any bro can make short video I’m very appreciate.
أعضاء أعجبوا بهذه المشاركة :
|