Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. C / C++ / MFC
  4. how to re-engineer code from binary or exe

how to re-engineer code from binary or exe

Scheduled Pinned Locked Moved C / C++ / MFC
toolstutorialquestion
12 Posts 5 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S SNI

    Hi, I have a question there are tools that can identify backdoors in a code by analising binaries of application i.e by doing re-engineering. Can anybody tell me how this works and is there any tool available for this. Thanks SNI

    SNI

    L Offline
    L Offline
    Lost User
    wrote on last edited by
    #2

    Why would you need to do this, are you trying to break into a bank?

    S 1 Reply Last reply
    0
    • L Lost User

      Why would you need to do this, are you trying to break into a bank?

      S Offline
      S Offline
      SNI
      wrote on last edited by
      #3

      No...I just want to know that is there any tool which does binary (.exe in release mode)inspection so that backdoors can be identified. If yes, whether it is possible with release version of exe or only with debug. Also would like to know are they using assembly code analysis of binary to come to conclusion?

      SNI

      L C 3 Replies Last reply
      0
      • S SNI

        No...I just want to know that is there any tool which does binary (.exe in release mode)inspection so that backdoors can be identified. If yes, whether it is possible with release version of exe or only with debug. Also would like to know are they using assembly code analysis of binary to come to conclusion?

        SNI

        L Offline
        L Offline
        Lost User
        wrote on last edited by
        #4

        It's always possible. Sometimes it's a little harder than otherwise, but it can not be impossible (since that would mean that you can not see any code, and then how would the CPU know what to do with your program?)

        L 1 Reply Last reply
        0
        • S SNI

          No...I just want to know that is there any tool which does binary (.exe in release mode)inspection so that backdoors can be identified. If yes, whether it is possible with release version of exe or only with debug. Also would like to know are they using assembly code analysis of binary to come to conclusion?

          SNI

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #5

          SNI wrote:

          No...I just want to know that is there any tool which does binary (.exe in release mode)inspection so that backdoors can be identified.

          I think Google is the place to look. However, I am not sure that any such tool could identify what you term "backdoors".

          1 Reply Last reply
          0
          • S SNI

            No...I just want to know that is there any tool which does binary (.exe in release mode)inspection so that backdoors can be identified. If yes, whether it is possible with release version of exe or only with debug. Also would like to know are they using assembly code analysis of binary to come to conclusion?

            SNI

            C Offline
            C Offline
            CPallini
            wrote on last edited by
            #6

            You may use the dumpbin tool [^], looking for 'backdoor' or 'please hack here' or 'virus place holder' sections. :-D

            If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
            This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke
            [My articles]

            L I 2 Replies Last reply
            0
            • S SNI

              Hi, I have a question there are tools that can identify backdoors in a code by analising binaries of application i.e by doing re-engineering. Can anybody tell me how this works and is there any tool available for this. Thanks SNI

              SNI

              S Offline
              S Offline
              Stephen Hewitt
              wrote on last edited by
              #7

              In general it would be hard to imagine how such a tool would work. The kind of thing you're asking for requires intelligence, which is something computers don't do well; they do dumb but fast. The normal way one would go about doing such a thing would to be use various tools, such as disassemblers, to take out some of the grunt work and help you visualise what's going on, but the user (you in this case) would do the "real" work.

              Steve

              L 1 Reply Last reply
              0
              • L Lost User

                It's always possible. Sometimes it's a little harder than otherwise, but it can not be impossible (since that would mean that you can not see any code, and then how would the CPU know what to do with your program?)

                L Offline
                L Offline
                Lost User
                wrote on last edited by
                #8

                Yea, right, onevote it.. It's true though. IDA should do, btw.

                1 Reply Last reply
                0
                • C CPallini

                  You may use the dumpbin tool [^], looking for 'backdoor' or 'please hack here' or 'virus place holder' sections. :-D

                  If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
                  This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke
                  [My articles]

                  L Offline
                  L Offline
                  Lost User
                  wrote on last edited by
                  #9

                  :laugh:

                  1 Reply Last reply
                  0
                  • C CPallini

                    You may use the dumpbin tool [^], looking for 'backdoor' or 'please hack here' or 'virus place holder' sections. :-D

                    If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
                    This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke
                    [My articles]

                    I Offline
                    I Offline
                    Iain Clarke Warrior Programmer
                    wrote on last edited by
                    #10

                    Can you download that from freehackingtools.freepallini.com[] ? Iain.

                    I have now moved to Sweden for love (awwww). If you're in Scandinavia and want an MVP on the payroll (or happy with a remote worker), or need contract work done, give me a job! http://cv.imcsoft.co.uk/[^]

                    C 1 Reply Last reply
                    0
                    • I Iain Clarke Warrior Programmer

                      Can you download that from freehackingtools.freepallini.com[] ? Iain.

                      I have now moved to Sweden for love (awwww). If you're in Scandinavia and want an MVP on the payroll (or happy with a remote worker), or need contract work done, give me a job! http://cv.imcsoft.co.uk/[^]

                      C Offline
                      C Offline
                      CPallini
                      wrote on last edited by
                      #11

                      Yes, or from the concise mirror f@#?ingtools.pallini.com[^] :-D

                      If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
                      This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke
                      [My articles]

                      1 Reply Last reply
                      0
                      • S Stephen Hewitt

                        In general it would be hard to imagine how such a tool would work. The kind of thing you're asking for requires intelligence, which is something computers don't do well; they do dumb but fast. The normal way one would go about doing such a thing would to be use various tools, such as disassemblers, to take out some of the grunt work and help you visualise what's going on, but the user (you in this case) would do the "real" work.

                        Steve

                        L Offline
                        L Offline
                        Lost User
                        wrote on last edited by
                        #12

                        Stephen Hewitt wrote:

                        ... requires intelligence, which is something computers don't do well; they do dumb but fast.

                        A bit like some of the posters here ... ;)

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups