<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="http://wiki.zenk-security.com/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://wiki.zenk-security.com/feed.php">
        <title>Zenk - Security sthack4</title>
        <description></description>
        <link>http://wiki.zenk-security.com/</link>
        <image rdf:resource="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico" />
       <dc:date>2026-04-09T12:10:03+02:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=sthack4:crackm3&amp;rev=1398138780&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico">
        <title>Zenk - Security</title>
        <link>http://wiki.zenk-security.com/</link>
        <url>http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico</url>
    </image>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=sthack4:crackm3&amp;rev=1398138780&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-04-22T05:53:00+02:00</dc:date>
        <title>sthack4:crackm3</title>
        <link>http://wiki.zenk-security.com/doku.php?id=sthack4:crackm3&amp;rev=1398138780&amp;do=diff</link>
        <description>A telecharger ici : &lt;https://github.com/StHack/2014-Binaries-Forensics/&gt;

On ouvre l'executable, il nous demande de rentrer un mot de passe.
On le charge donc avec ollydbg (il y a quelques protections anti debug, comme des appels a “isDebuggerPresent”, facilement contournables avec des plugins), et on regarde la partie du code qui affiche ce message, et ce qu'il y a autour :</description>
    </item>
</rdf:RDF>
