Laman

Sabtu, 04 Februari 2012

Description about "ollyDbg"


Debugger is the software used to test and "debug" code. an application for analyzing debugger. For each module (executable or DLL  file) try to separate code from data, identify the procedure, look for strings that are embedded and switch tables, determining the loop and the switch, find the function call and decode their arguments, and even predict the value of the register app.

If you need to see where the error occurred in a piece of code that you have recently compiled, then you can run it through a debugger to find problems. There are plenty of software out there that could be considered a debugger, but they do not go into details of the same depth as the second did.  


Ollydbg is a free debugger seems to be the tool of choice for novice hackers cracking the software program. Price tag and ease of use of this tool allows you to make changes to the software that had been developed, very easy. When we say compiled, we are talking about the process of changing the code written to create a software to exe file. Usually after the code has been transformed into an EXE file so the software can not be changed and ready to run. When you use Ollydbg that did not happen. It can be seen through the program as assembly code, allowing you to make changes, and then run the exe as usual. 

The main limitation of Ollydbg is that it is only able to break the 32 bit file. IDA Pro has pretty much the same features as Ollydbg not but enhance these features by offering more formats to be able to unload. Also they have a better visual to trace the exact path of how a program is run. Where Ollydbg can only operate on a 32 bit file, IDA can operate at 32 and 64 bit as well. It also debugs files from devices other than computers. It can penetrate file video game console and a number of other formats.Most security professionals using IDA Pro to their daily work. The biggest drawback for people who use IDA Pro is a cost. IDA Pro costs a few hundred dollars and it is for every person who uses under license. If you have more than one team, the cost increases very rapidly. These are the two main tools that reverse engineers and hackers use to get the job done. 


@keep smile & spirit
be fun 

Tidak ada komentar:

Posting Komentar