Easy Unpack
Writeup for Easy Unpack from Reversing.kr
Last updated
Writeup for Easy Unpack from Reversing.kr
Last updated
This is the third writeup of my reversing series from Reversing.kr. This challenge was actually easy as compared to the past two. I have shown two approaches to solve this challenge.
This time zip file contains one executable and one README.txt.
We are supposed to find OEP(Original Entry Point) in the executable.
On clicking the Generic OEP Finder. We get our OEP.
Drop it into x32dbg and track the process step by step. You will get a jump on 0x0040A1FB.
Follow it and you will get the OEP 00401150.
is a great tool for detecting common packers, cryptors, and compilers for PE files. It has various plugins available. One of which is Generic OEP Finder.