![]() ![]() When it comes to reverse-engineering, packed/protected executables must be unpacked/unprotected before utilities which operate on the on-disk form of the program will return useful results. (Aside from JavaScript minifiers, for which an effect similar to a decompiler can be achieved using a code beautifier.) They still see use to this day, but exponential decline in the cost of storage space, combined with the risk of false positives from virus scanners, has reduced the demand for this sort of software. In the days of DOS and Windows 3.x, executable packers and code protectors like PKLite and PackWin were a common means of saving precious disk space, as well as deterring casual inspection of an executable by novices with tools like DEBUG.COM. Reverse Engineering for Beginners by Dennis Yurichev. ![]() ScummVM Wiki – HOWTO-Reverse Engineering.Reversing a 16-bit NE File Part 1: Clumsy and Unprepared.While offering some advice, I got a little caught up in the research I was doing, so here’s a list of the resources I found for picking apart 16-bit x86 applications. See Also: My list of tips and resources for writing new DOS and Win16 apps
0 Comments
Leave a Reply. |