Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > File Unpacking
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Thread Tools Display Modes
Old 03-27-2016, 10:13 AM
Abg_Beca Abg_Beca is offline
Join Date: Nov 2009
Posts: 16
Default How to Break at OEP

if the OEP is believed to be at 0x60D35A ,
how to load the program and stop at that OEP using OllyDbg?
the program is packed using HASP HL

Thank you
Reply With Quote
Old 04-29-2016, 04:34 AM
user1 user1 is offline
Senior Member
Join Date: Jun 2011
Posts: 332

you tried unpack?
dongle backup
Reply With Quote
Old 04-29-2016, 02:58 PM
Larry Larry is offline
Join Date: Oct 2008
Posts: 24
Send a message via ICQ to Larry

Abg_Beca, press Ctrl+G, enter address 60D35A, click right-mouse button and set the option Breakpoint -> Hardware, on execution. Then run the target.
Reply With Quote

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2023, Jelsoft Enterprises Ltd.