Jump to content

OllyDbg

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 31.50.70.172 (talk) at 02:56, 22 December 2014 ((named after its author, Oleh Yuschuk)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

OllyDbg
Original author(s)Oleh Yuschuk
Developer(s)Oleh Yuschuk
Stable release
2.01 / 27 September 2013; 11 years ago (2013-09-27)
Preview release
2.01h (beta 2) / 19 November 2012; 11 years ago (2012-11-19)
Operating systemMicrosoft Windows
TypeDebugger
LicenseShareware/Freeware
Websitehttp://www.ollydbg.de/

OllyDbg (named after its author, Oleh Yuschuk) is an x86 debugger that emphasizes binary code analysis, which is useful when source code is not available. It traces registers, recognizes procedures, API calls, switches, tables, constants and strings, as well as locates routines from object files and libraries. It has a friendly interface, and its functionality can be extended by third party plugins. Version 1.10 is the final 1.x release. Version 2.0 has recently been released, and OllyDbg has been rewritten from the ground up in this release. The software is free of cost, but the shareware license requires users to register with the author.[1] Also the current version of OllyDbg cannot disassemble binaries compiled for 64-bit processors, though a 64-bit version of the debugger has been promised.[2]

Reverse engineering

OllyDbg is often used for reverse engineering of programs.[3] It is often used by crackers to crack software made by other developers. For cracking and reverse engineering, it is often the primary tool because of its ease of use and availability; any 32 bit executable can be used by the debugger can be edited in bitcode/assembly in realtime.[4] It is also useful for programmers to ensure that their program is running as intended, and for malware analysis purposes.

References

  1. ^ "Download". Archived from the original on 27 May 2012.
  2. ^ "OllyDbg 2.01". Archived from the original on 27 May 2012.
  3. ^ Eilam, Eldad (2005). Reversing: secrets of reverse engineering. Wiley. p. 118. ISBN 978-0-7645-7481-8. Retrieved 3 May 2011.
  4. ^ Ferguson, Justin; Kaminsky, Dan (2008). Reverse engineering code with IDA Pro. Syngress. p. 130. ISBN 978-1-59749-237-9. Retrieved 3 May 2011.