Solved

Decompile exe to Readable Code

Posted on 2009-05-13
10
653 Views
Last Modified: 2012-05-06
I am wondering if there is a way to decompile an .exe to readable source code.  If one were to include sensitive information in an exe, is it safe?  Thoughts?

If you would like a test file, post and I will see what I can do.
0
Comment
Question by:APasquali
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
  • 2
10 Comments
 
LVL 50

Expert Comment

by:jcimarron
ID: 24380550
0
 

Author Comment

by:APasquali
ID: 24380555
Tried both of those, didnt help.
0
 
LVL 50

Expert Comment

by:jcimarron
ID: 24380688
APasquali--"Tried both of those, didnt help'
Just what is it you are looking for on this subject?
And what is the offer you make about a test file?  Do you have a method to decompile .exe?
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 
LVL 23

Expert Comment

by:Mohamed Osama
ID: 24380984
Reflector and File disassembler should do just fine for .NET VB / C# applications 
however there is no universal tool to do this , reverse engineering is a big topic , so you may want to be a bit specefic here
- what programming language is this executable coded in?
- is it packed ?, if so you will need to unpack it 
http://en.wikipedia.org/wiki/Executable_compression
- if you are just looking for readable text strings , open it using a Hex editor like Winhex or Hexit, look for text strings
there is also a nifty tool called PEEK, which will allow you to peek inside an executable through a simple shell extension.
there are also more advanced techniques to reverse an exxecutable , like memory dumping ,but you will require some assembly & solid knowlege  of disassembly / reverse engineering tools .




0
 

Author Comment

by:APasquali
ID: 24381105
jcimarron:
I want to know if anyone who has an exe can decompile the exe and pull any type of valuable information from it and just how easy it is.
I will attach an exe I have created and I would like to see if there is a method of pulling the actual code out of it.  
Change the .doc extension to .exe and it should be good to go.  The file will just open your network connections window.


Admin3k:
I am looking at this as if you received the exe with out my knowledge and you wanted to hack it to pull valuable info out of it.
I have tried some hex dumps but have not been able to pull anything useful from it.  I am looking into that peek program.


My main question is how hard is it to hack an exe and pull info from it with out having any prior knowledge of it.

hackme.doc
0
 
LVL 23

Expert Comment

by:Mohamed Osama
ID: 24381247
I was able to note this an AutoIT compiled executable , below  link t will elaborate more on reverse engineering those.
http://www.openrce.org/forums/posts/178

0
 

Author Comment

by:APasquali
ID: 24381252
How did you find it was an AutoIT executable?
0
 
LVL 23

Expert Comment

by:Mohamed Osama
ID: 24381261
File>properties>version
it even gave away AutoIt version used

0
 
LVL 23

Accepted Solution

by:
Mohamed Osama earned 500 total points
ID: 24381287
there are also text strings in that executable that will give away it was packed using UPX which is used by AutoIT, as well as autoIT version , once Unpacked , a lot more of the code will show in a hex editor.
unpacking this & going through the previous link to obtain the original script is acheivable, if this is what you are asking.
hope this helps.


0
 

Author Closing Comment

by:APasquali
ID: 31581261
Not really what I was looking for but it helped.  Mostly my fault for not being able to explain what I was looking for.
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
What are the recommended security measures to put in place? 19 94
Frequency of Windows Server updates 27 138
Updates for XP? 26 102
Safekeeping  vba code 8 44
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
A hard and fast method for reducing Active Directory Administrators members.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question