By ro0ted | April 17, 2015 - 11:37 | Posted in /b/ | 5 Comments
#ro0ted #OpNewblood What the blackhats don’t want you to know: Add your own menu

This one is about adding a menu box to an .exe. – https://twitter.com/ro0ted/

 

I will be using Notepad++ for this example.
Okay we open Notepad++…:

Untitled

We can see there are several menus:

Untitled

Open the target now in Resource Hacker:

Untitled

Click the Menu module:

Untitled

Now we go to tab 1500 and we see all the menu items:

Untitled

Real simple to add a menu item just enter:

MENUITEM “your text”

and after continue the next number

for example:

Untitled

Then click Compile Script:

Untitled

Now go to File>Save:

Untitled

Now re open the target:

Untitled

That’s it. Just a lil fun thing. Been busy. Will add more later.

ro0ted

 


 

 

(In order)

Why am I teaching Reverse Engineering to inexperienced new Anons in OpNewblood?

Whitehat Lab

ASM Programming

Introduction Part 1 Ollydbg 

Introduction Part 2 Using Ollydbg and Tracing Botnets

Analyzing Botnets

 Introduction Part 3 Ollydbg: Cheating a Crackme

Introduction Part 4 Ollydbg: Your first Patch

Encryption 101

Cuckoo Sandbox: Automated Malware Analysis also known as Malwr.com

Introduction to Honeydrive: A Brief Walk Through

Installing Kippo the SSH Honeypot on a VPS Part 1: How to set it up

Resource Hacker

Dll Injection the Easy Way

Visual Basic Binaries Walk Through Part 1

Ollydbg on Steroids

Creating Patchers Part 1

Have you supported the gas mask campaign over the years?

Crack to win a gas mask gift pack

How to edit a register me crack me Pre Part 1

Unwinding Delphi Binaries Walk Through if not Preview

Cracking Delphi Part 2

Reversing Timed Trials: Ollydbg Tricks Part 3

Analyzing Adware

Preview Against Debugging

Bypassing Registering 101

Bypassing Part 2

Android/iOS Reversing

Introducing IDA Pro: Static Analyzing

Hacker’s Disassembler

Ripping Apart Adware

Never trust Warez or Cracked Programs: Reversing a Crypted IRC bot infected file

IDA PRO Book

Unpacking & Crypting there is a difference

Covert Debugging whitepaper from blackhat.com

Manually Unpacking with Ollydbg

Manually Unpacking Part 2

Manually Unpacking 101

ASM Injecting

ASM Injecting Part 2

ASM Injecting Part 3: Crypt your malicious file

Reversing Trials

Adding Your Menu +

 

(Visited 417 times, 1 visits today)


  • You can follow any responses to this entry through the RSS 2.0 feed.
  • Both comments and pings are currently closed.