?
Solved

Decompile exe to Readable Code

Posted on 2009-05-13
10
Medium Priority
?
674 Views
Last Modified: 2012-05-06
I am wondering if there is a way to decompile an .exe to readable source code.  If one were to include sensitive information in an exe, is it safe?  Thoughts?

If you would like a test file, post and I will see what I can do.
0
Comment
Question by:APasquali
  • 4
  • 4
  • 2
10 Comments
 

Author Comment

by:APasquali
ID: 24380555
Tried both of those, didnt help.
0
 
LVL 50

Expert Comment

by:jcimarron
ID: 24380688
APasquali--"Tried both of those, didnt help'
Just what is it you are looking for on this subject?
And what is the offer you make about a test file?  Do you have a method to decompile .exe?
0
Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

 
LVL 23

Expert Comment

by:Mohamed Osama
ID: 24380984
Reflector and File disassembler should do just fine for .NET VB / C# applications 
however there is no universal tool to do this , reverse engineering is a big topic , so you may want to be a bit specefic here
- what programming language is this executable coded in?
- is it packed ?, if so you will need to unpack it 
http://en.wikipedia.org/wiki/Executable_compression
- if you are just looking for readable text strings , open it using a Hex editor like Winhex or Hexit, look for text strings
there is also a nifty tool called PEEK, which will allow you to peek inside an executable through a simple shell extension.
there are also more advanced techniques to reverse an exxecutable , like memory dumping ,but you will require some assembly & solid knowlege  of disassembly / reverse engineering tools .




0
 

Author Comment

by:APasquali
ID: 24381105
jcimarron:
I want to know if anyone who has an exe can decompile the exe and pull any type of valuable information from it and just how easy it is.
I will attach an exe I have created and I would like to see if there is a method of pulling the actual code out of it.  
Change the .doc extension to .exe and it should be good to go.  The file will just open your network connections window.


Admin3k:
I am looking at this as if you received the exe with out my knowledge and you wanted to hack it to pull valuable info out of it.
I have tried some hex dumps but have not been able to pull anything useful from it.  I am looking into that peek program.


My main question is how hard is it to hack an exe and pull info from it with out having any prior knowledge of it.

hackme.doc
0
 
LVL 23

Expert Comment

by:Mohamed Osama
ID: 24381247
I was able to note this an AutoIT compiled executable , below  link t will elaborate more on reverse engineering those.
http://www.openrce.org/forums/posts/178

0
 

Author Comment

by:APasquali
ID: 24381252
How did you find it was an AutoIT executable?
0
 
LVL 23

Expert Comment

by:Mohamed Osama
ID: 24381261
File>properties>version
it even gave away AutoIt version used

0
 
LVL 23

Accepted Solution

by:
Mohamed Osama earned 1500 total points
ID: 24381287
there are also text strings in that executable that will give away it was packed using UPX which is used by AutoIT, as well as autoIT version , once Unpacked , a lot more of the code will show in a hex editor.
unpacking this & going through the previous link to obtain the original script is acheivable, if this is what you are asking.
hope this helps.


0
 

Author Closing Comment

by:APasquali
ID: 31581261
Not really what I was looking for but it helped.  Mostly my fault for not being able to explain what I was looking for.
0

Featured Post

Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Current business processes need to constantly adapt to changing threats. Surely we do not want to be the next victim. We can take an active stance and stay agile. This article shares some tips.
A discussion about Penetration Testing and the Tools used to help achieve this important task.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

589 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question