Immunity Debugger find file entry point

To find the address of a file entry point in Immunity Debugger.
note: images to follow :)

  1. Start the program
  2. Attach the program to Immunity Debugger
  3. Click on the letter e to open up the Executable modules window
  4. Locate the file you are running
  5. Under the entry tab will be the address
  6. Copy the address, right click and copy to clipboard then select entry
  7. Click on the letter c to take you back to the CPU window
  8. Click on the forward arrow with the four dots this will open up the Enter expression to follow window
  9. Paste in the address, and click OK

Just signed up for my OSCE

It’s the 18th of May 2017 and just over a month since I completed my OSCP. I have decided to take things further with my career progression and signed up for the OSCE course by Offensive Security.

Why?

You may be asking yourself why I have decided to take the Cracking the Perimeter (OSCE) course. Well, after starting the OSCP without any prior experience to penetration testing, I found the course to be fantastic and a credit to Offensive Security. OSCP not only showed me how to do a penetration test, it showed me so much more. It showed me that no matter the difficulties encountered, if you have the determination and can do attitude you will succeed. The Offensive Security mantra TRY HARDER definitely comes to play in the OSCP and I believe it will continue throughout OSCE.

So as you can probably tell, courses from Offensive Security are hard and they are hard for a reason. They teach you that if you want become good at something, you need to suffer and keep up the Offensive Security mantra of TRY HARDER. This is why I have decided to take the Cracking the Perimeter (OSCE) course. I know its going to be hard, I know I am going to cry, and I know that I will have to TRY HARDER… but I will succeed.

My HackRF

The HackRF One is a Software Defined Radio capable of transmission or reception of radio signals from 1 MHz to 6 GHz. Designed to enable test and development of modern and next generation radio technologies, HackRF One is an open source hardware platform that can be used as a USB peripheral or programmed for stand-alone operation.

  • 1 MHz to 6 GHz operating frequency
  • half-duplex transceiver
  • up to 20 million samples per second
  • 8-bit quadrature samples (8-bit I and 8-bit Q)
  • compatible with GNU Radio, SDR#, and more
  • software-configurable RX and TX gain and baseband filter
  • software-controlled antenna port power (50 mA at 3.3 V)
  • SMA female antenna connector
  • SMA female clock input and output for synchronisation
  • convenient buttons for programming
  • internal pin headers for expansion
  • Hi-Speed USB 2.0
  • USB-powered
  • open source hardware