Hola, Soy novato en Ingenieria Inversa, pero tampoco quiero especializarme.
El problema es que dentro de un ejecutable tipo EXE existe un logo que quiero eliminar, qual es la forma mas sencilla.
Poseo Windows 10 y Linux
Cita de: Mr.Byte en 13 Abril 2016, 15:55 PM
Hola, Soy novato en Ingenieria Inversa, pero tampoco quiero especializarme.
El problema es que dentro de un ejecutable tipo EXE existe un logo que quiero eliminar, qual es la forma mas sencilla.
Poseo Windows 10 y Linux
Si la imagen esta incluida dentro del ejecutable como recurso, con un editor de recursos, la podras cambiar.
Si no lo está, es más complejo y vas a necesitar
especializarte en el tema para poder cambiarla. :P
Saludos!
¿En qué lenguaje está programado el software?
Cita de: .:UND3R:. en 13 Abril 2016, 19:21 PM
¿En qué lenguaje está programado el software?
Lo desconozco
File Size : 1,181,696 Bytes
Created Date : 07/01/2016 17:36:04
Modified Date : 07/01/2016 17:36:04
Executable Format : Portable Executable (32-bit)
MS-DOS Header Information
=========================
Bytes in the last page : 144
Number of pages : 3
Relocation entries : 0
Header size in paragraphs : 4
Initial SS (Relative) : 0x0000
Initial SP : 0x00b8
Initial CS (Relative) : 0x0000
Initial IP : 0x0000
Checksum : 0x0000
Portable Executable Header Information
===================================
Machine : Intel 386
Number Of Sections : 5
Number Of Symbols : 0
Optional Header Size : 224 Bytes
Time Stamp : 0x568ea23d
Characteristics :
Optional Header Information
===================================
Linker Version : 9.0
Size Of Code : 432,128 Bytes
Size of initialized data : 748,544 Bytes
Size of uninitialized data : 0 Bytes
Section Alignment : 4,096 Bytes
File Alignment : 512 Bytes
OS Version : 5.0
Image Version : 0.0
Subsystem Version : 5.0
Size Of Image : 1,204,224 Bytes
Size Of Headers : 1,024 Bytes
Checksum : 0x0012d500
Subsystem : Windows GUI
Reserve Stack Size : 0x00100000
Commit Stack Size : 0x00001000
Reserve Heap Size : 0x00100000
Commit Heap Size : 0x00001000
Base Address : 0x00400000
Entry Point : 0x00069a0f
Base Of Code : 0x00001000
Base Of Data : 0x0006b000
Section Headers Information
===================================
This file has 5 sections:
----------------------------------------
Section Name : .text
Virtual Address : 0x00001000
Raw Data Size : 0x00069800
Raw Data Pointer : 0x00000400
Characteristics : Code, Executable, Readable
----------------------------------------
Section Name : .rdata
Virtual Address : 0x0006b000
Raw Data Size : 0x0003ac00
Raw Data Pointer : 0x00069c00
Characteristics : Initialized Data, Readable
----------------------------------------
Section Name : .data
Virtual Address : 0x000a6000
Raw Data Size : 0x00054200
Raw Data Pointer : 0x000a4800
Characteristics : Initialized Data, Readable, Writable
----------------------------------------
Section Name : .rsrc
Virtual Address : 0x000fd000
Raw Data Size : 0x0001ac00
Raw Data Pointer : 0x000f8a00
Characteristics : Initialized Data, Readable
----------------------------------------
Section Name : .reloc
Virtual Address : 0x00118000
Raw Data Size : 0x0000d200
Raw Data Pointer : 0x00113600
Characteristics : Initialized Data, Readable
----------------------------------------
Version Information
====================
Version information is not available for this file.
Cita de: Mr.Byte en 14 Abril 2016, 00:11 AM
Lo desconozco
File Size : 1,181,696 Bytes
Created Date : 07/01/2016 17:36:04
Modified Date : 07/01/2016 17:36:04
Executable Format : Portable Executable (32-bit)
MS-DOS Header Information
=========================
Bytes in the last page : 144
Number of pages : 3
Relocation entries : 0
Header size in paragraphs : 4
Initial SS (Relative) : 0x0000
Initial SP : 0x00b8
Initial CS (Relative) : 0x0000
Initial IP : 0x0000
Checksum : 0x0000
Portable Executable Header Information
===================================
Machine : Intel 386
Number Of Sections : 5
Number Of Symbols : 0
Optional Header Size : 224 Bytes
Time Stamp : 0x568ea23d
Characteristics :
Optional Header Information
===================================
Linker Version : 9.0
Size Of Code : 432,128 Bytes
Size of initialized data : 748,544 Bytes
Size of uninitialized data : 0 Bytes
Section Alignment : 4,096 Bytes
File Alignment : 512 Bytes
OS Version : 5.0
Image Version : 0.0
Subsystem Version : 5.0
Size Of Image : 1,204,224 Bytes
Size Of Headers : 1,024 Bytes
Checksum : 0x0012d500
Subsystem : Windows GUI
Reserve Stack Size : 0x00100000
Commit Stack Size : 0x00001000
Reserve Heap Size : 0x00100000
Commit Heap Size : 0x00001000
Base Address : 0x00400000
Entry Point : 0x00069a0f
Base Of Code : 0x00001000
Base Of Data : 0x0006b000
Section Headers Information
===================================
This file has 5 sections:
----------------------------------------
Section Name : .text
Virtual Address : 0x00001000
Raw Data Size : 0x00069800
Raw Data Pointer : 0x00000400
Characteristics : Code, Executable, Readable
----------------------------------------
Section Name : .rdata
Virtual Address : 0x0006b000
Raw Data Size : 0x0003ac00
Raw Data Pointer : 0x00069c00
Characteristics : Initialized Data, Readable
----------------------------------------
Section Name : .data
Virtual Address : 0x000a6000
Raw Data Size : 0x00054200
Raw Data Pointer : 0x000a4800
Characteristics : Initialized Data, Readable, Writable
----------------------------------------
Section Name : .rsrc
Virtual Address : 0x000fd000
Raw Data Size : 0x0001ac00
Raw Data Pointer : 0x000f8a00
Characteristics : Initialized Data, Readable
----------------------------------------
Section Name : .reloc
Virtual Address : 0x00118000
Raw Data Size : 0x0000d200
Raw Data Pointer : 0x00113600
Characteristics : Initialized Data, Readable
----------------------------------------
Version Information
====================
Version information is not available for this file.
RDG Packer detector?
Cita de: .:UND3R:. en 14 Abril 2016, 05:25 AM
RDG Packer detector?
No, lo he realizado con una utilidad de Sysinternals, aunque no me acuerdo el nombre.
El ejecutable lo he abierto con Notepad++, y hay parte del codigo legible(errores del programa...), o sea, no utiliza ofuscación ni nada por el estilo.
Lo de .:UND3R:. no es una pregunta, es una sugerencia. Usa RDG Packer detector para saber con qué ha sido compilado y si tiene protección (packer).
Saludos!
Cita de: MCKSys Argentina en 14 Abril 2016, 15:50 PM
Lo de .:UND3R:. no es una pregunta, es una sugerencia. Usa RDG Packer detector para saber con qué ha sido compilado y si tiene protección (packer).
Saludos!
>:D >:D >:D
RDG Packer lo unico que dice es Visual C++ 9; Nada
Cita de: Mr.Byte en 14 Abril 2016, 23:16 PM
>:D >:D >:D
RDG Packer lo unico que dice es Visual C++ 9; Nada
Entonces prueba con un editor de recursos.