Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's interesting. The UPX string is most likely a name of section in PE file. It's first UPX string you will find in the file.

How did UPX loader managed to find the section in which packed content is stored?

UPD. It's REALLY easy to "hack" this protection. You simply need to attach a debugger and you will see unprotected exe file in the memory. There are tools to convert loaded unprotected exe file into regular exe file on the disk. So... No one really tried to hack you. Sorry.



I dunno know. But this method worked for years!


See my update. You could only stop kids, who tried to use UPX unpackers.


Nice to know!

Well, It was another protection layer for, like you sad, to keep bad kids away.

This was 10 years ago already.


Armadillo from Silicon Works is what anyone used if they were serious. You haven't met my friends Olly and Ada ;-)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: