Bypassing BlackMatter Anti-Debug With x64dbg [Patreon Unlocked]

  Рет қаралды 32,687

OALabs

OALabs

Күн бұрын

Пікірлер: 32
@robbie_984
@robbie_984 2 жыл бұрын
Excellent video. A tip for those who want to "automate" the skip so you don't have to change the IP every time. Check the function out and if it is just calling NtSetInformationThread or some other anti-debug code and it doesn't contain important malware code (which it usually doesn't since it is isolated anti-debug function) you can simply NOP the whole call and skip over that check every time you restart the exe\dll in the debugger.
@OALABS
@OALABS 2 жыл бұрын
Nice tip!
@sylvesterangiho9146
@sylvesterangiho9146 Жыл бұрын
Pls I want to learn software how can you help me please
@pedrobarthacking
@pedrobarthacking 5 ай бұрын
Amazing content! Please do more videos Reverse engineering context! thank you.
@surajsawant6469
@surajsawant6469 3 жыл бұрын
this is amazing... nice work. thanks for sharing.
@az2252
@az2252 3 жыл бұрын
I never thought about using graph view while using x64 lol As always, your vids are the best.
@OALABS
@OALABS 3 жыл бұрын
Thanks! Sometimes it's very useful to see see the control flow from another perspective.
@mytechnotalent
@mytechnotalent 3 жыл бұрын
Brilliant as always!
@qweoiwjewiodc1954
@qweoiwjewiodc1954 2 жыл бұрын
Excellent video
@Axcmotora
@Axcmotora 2 жыл бұрын
Thank you for this Good turtorial :)
@hannahprobably5765
@hannahprobably5765 3 жыл бұрын
features ! love them all 🚩❤
@hisokamorow5495
@hisokamorow5495 4 күн бұрын
Hi thank you for everything you give 👍 my question i have run a program but PID doesn't show on 64xdbg, is there any way that i can bypass that
@_why_3881
@_why_3881 3 жыл бұрын
What would be the approach when the exe reproduces itself and its threads (like in process explore you can see 6times the same process)
@OALABS
@OALABS 3 жыл бұрын
That's a completely different topic ;) You may want to check out some of our process injection unpacking tutorials.
@lucasjulianlacognata6670
@lucasjulianlacognata6670 3 жыл бұрын
Thanks Teacher, have you considered writing a book about reversing?
@OALABS
@OALABS 3 жыл бұрын
No books, just live workshops and videos : )
@wittingsun7856
@wittingsun7856 5 ай бұрын
Couldn't you have inserted a jump instead of the push 0?
@dmitriydibenko5529
@dmitriydibenko5529 2 жыл бұрын
May I ask you to make a video about Software Nanomites?)
@OALABS
@OALABS 2 жыл бұрын
No, lol
@dmitriydibenko5529
@dmitriydibenko5529 2 жыл бұрын
Almost the same trick, as Enigma does to detach from the debugger. However, if I remember correctly, Enigma uses ZwSetInformationThread instead
@sylvesterangiho9146
@sylvesterangiho9146 Жыл бұрын
Hi please help me crack my software
@SilentGaming-SG
@SilentGaming-SG Жыл бұрын
Can this method remove the x63dbg (32bit) virus???
@atoma8921
@atoma8921 Жыл бұрын
Where is the part II?
@OALABS
@OALABS Жыл бұрын
On our Patreon : ) www.patreon.com/posts/analyzing-anti-57443723
@Sezdik
@Sezdik 3 жыл бұрын
hello, is there someone sleeping while you record? there is background voice.. like snoring ... just sayn
@OALABS
@OALABS 3 жыл бұрын
Haha that's my bulldog Boris. If you check out our streams on Twitch you will see he sleeps beside my desk and has his own doggo cam
@nonskeetuser760
@nonskeetuser760 3 жыл бұрын
I think i want to marry this man
Quando A Diferença De Altura É Muito Grande 😲😂
00:12
Mari Maria
Рет қаралды 45 МЛН
Debugging a DLL Export With x64dbg [Patreon Unlocked]
11:15
How To Defeat Anti-VM and Anti-Debug Packers With IDA Pro
48:37
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 799 М.
Self-Learning Reverse Engineering in 2022
9:09
LiveOverflow
Рет қаралды 401 М.
Quando A Diferença De Altura É Muito Grande 😲😂
00:12
Mari Maria
Рет қаралды 45 МЛН