Reverse Engineering - Unpacking UPX manually with IDA Pro and Scylla
Reverse Engineering - Unpacking UPX manually with IDA Pro and Scylla
In this video we go through unpacking UPX manually using IDA Pro, Lord PE and Scylla. If you feel like skipping through the video, here are the steps:
* Pack a random binary and examine it (Code, Import/Export table)
* Locate the jump to the original entry point (OEP)
* Set a breakpoint before the jump to the OEP
* Take the jump
* Dump the process using LordPE, making sure it’s a Full Dump
* Attach with Scylla (x86 version for 32-bit pro