Welcome to the new Woodmann RCE Messageboards Regroupment

This Forum is now strictly read-only. New Memberships and Postings have stopped.

Remember that under the RCE Links tab are the classic sites:

Fravia's Archive of Reverse Engineering
Fravia's Searchlores
CrackZ's Reverse Engineering Page
Yates - Reverse-Engineering.info

Enjoy 20+ years of Reverse Engineering discussions!
So Long.

Never break on EOP

Found a bug in OllyDbg? Post a report here.

Never break on EOP

Post by Newbie_Cracker »

Please see the article in the follwing address.
Olly could not break on OEP and directly runs the proggy.


Here is another trick for killing Ring-3 debuggers !!
Senior Member
Posts: 1536
Joined: Wed Dec 08, 2004 11:12 am

Never break on EOP

Post by blabberer »

hehe it has been documented already some where i even have a post about about this phenomena in this forum on some queer post
i think i replied it in regard to 1bitshort's query
and lately this was again pointed out by
nicolez brulez of armadillo (in his paper to honeynet scan of the month 33
results ) he actually thought it will stop olly somehow loading the app
but ollydbg loads the application and executes it without stopping
on ep (the reason he states for his thinking is
about modifiaction to LoaderFlags and Rva Entries in the pe-header

but i beleieve they are not the only problems i have seen apps
which dont have this modification but still execute the said application
:( probably there are more issues out there apart from these modification :(

anyway to counter the above problem one can physically modify the

entry point bytes 0xeb 0xfe (infinte jump)
and load the exe when it has completely loaded (ignore the warning about not valid blah blah )
press f12 and pause the application
it will stop in the infinite jumps :) modify the bytes back to original values
and then you can find all of the string referances and import names all such s***

have fun

Never break on EOP

Post by Bob »

what is the trick? the url has gone..