server monitoring
+ Reply to Thread
Results 1 to 3 of 3

Thread: Dis-assembly help

  1. #1
    Join Date
    Oct 2007

    Dis-assembly help

    Can anyone offer any insight to this problem.
    I went through the tutorials mentioned in another thread, and am attempting to apply the same principle of ignoring the password required.
    Here is the dillema.
    Using W*2Dasm I locate the string and I see the indication:
    *Referenced by a (U)nconditional or (C)onditional jump at address:

    I go up to 0040*4C* and see this instruction.
    :0040*4C* 0F840A0*0000 je 0040*5D*

    Now what I am expecting is to see the Hex representation of 'je' (=74h)
    But the code string appears to start with 0Fh.

    Other je command strings in the program appear as starting with 74h.

    Can anyone shed some light on this?

  2. #2
    Join Date
    Dec 2007
    It's a near jump instead of a short. Short jumps can only jump *28 to +*27 from the current EIP value. Yours jumps 272 bytes so the op codes are different.

    For more info check out this page...

  3. #3
    Join Date
    Oct 2007
    Thanks, I discovered it also by searching about 20min ago.
    I have tried uploading the one I have, but Divshare gave me problems so I have to sort that out first.
    I looked at the link, but it does not appear to give the code for the je & jne far jump.
    I am trying Olldbg which seems like an excellent program, but some of the files it says 'Does not appear to be an exe file' and does not load them, inspite of the fact I can run them as executables.
    Can't win
    Getting closer.

+ Reply to Thread

Similar Threads

  1. Replies: 2
    Last Post: 04-21-2016, 06:39 AM
  2. Hardware Requirements for Assembly Language
    By loopers in forum Internet Privacy
    Replies: 1
    Last Post: 01-13-2003, 10:13 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts