Friday, October 23, 2009

How to disable autorun in group policy

Worms and viruses from mobile disks are really annoying. There are too many viruses and worms that uses the autorun.inf file to spread the infection.
If you have a mobile disk, you can actually check the content of the autorun.inf file to verify if it's really calling a legitimate file by viewing it's content using Notepad.

The worm writer modifies or creates their own "autorun.inf" file on your mobile disks. So whenever you insert an infected USB storage device, the worm can be transferred to that machine automatically.

There are some Anti-virus that can easily blocked a suspicious autorun.inf file from running. Though, i suggest following the procedure below to disable autorun.


Windows 2003 Active Directory Group Policy


1. Open "Group Policy Management" if you don't have you can download it here.


2. Right click select on the domain where you want this policy to be implemented and select "Create or Link a GPO here". Or if you have an existing GPO that you want to use, you can go to step 5.





3. Name it to "Disable Autorun" and click Ok






4. Write click the newly created or an existing GPO and select Edit.






5. Go to Computer Configuration >>> Administrative templates >>> System and double-click Turn-Off Autoplay. Select "Enabled" and select "All Drives" on the drop-down list.







Sunday, October 11, 2009

Replacing my Samsung U700 Flex Cable

I can't use my Samsung U700 phone for 3 months now and i'm too lazy to take it to Samsung service center at Green Hills. The screen has no display and i hear a little snap whenever the LCD display is slided.I guess it has something to do with cables.

I then decided to disassemble it myself to check if there might be a disconnected cable or something.

Indeed, the flex cable connected to the LCD board has a scratches on it. I bought a new one for P400.00 and as a souvenir, hehe, I've taken a video while i'm replacing it. Here are some of the snapshots.    
















































Friday, October 9, 2009

Reverse Engineering Basics (Crackme01 by AttilhaZ)

I got bored during rainy days, as a past time i'm doing some reverse engineering.

This will give you some idea on how i found the correct serial number of a crackme01 file. This file was created by Attilhaz for those who want to test their skills in reverse engineering.

To start with, let's fire up crackme01.exe



Try to put a wrong password and take note of that error message.



Now close crackme01 and fire up OllyDbg. Click File >>> Open >>> and browse open the crackme01.exe. The window will look like the one shown below.



Right click somewhere on the CPU main thread window, and go to "Search for" >>> and select "All referenced text strings"



Scroll down until you find the text string "The serial you have entered is invalid. Try again!!!".



If you will notice, it seems that there is a hard coded serial number on the program. The one that i'm referring to is the fourth text string "Rmth2hm89T21" before the "The serial you have entered is invalid. Try again!!!".

Let's take note of this serial. Close OllyDbg and fire up crackme01.exe. Try to input the serial number.




Friday, October 2, 2009

Reverse Engineering Basics (Crackme02 by AttilhaZ)


The file for the day is crackme02 written by attilhaz.

The author wants us to remove the NAG dialog box that appears before the main window.

NAG is at "0040238D to 00402392" memory addresses.

What i did was padding this addresses with "NOP" or "90" and some text modification on the main window.