I became interested in visual novels (and anime) much earlier than I became interested in hacking them for translation purposes. This happened near September of 2008 (I still remember the month because that’s the time school year starts lol).
When this happened I suddenly found that I’m able to understand those messy lines of what seemed like totally unmanagable assembler code beforethat came out of OllyDbg almost scaring me to faints. I’ve set up a page with my visual novel (or shortly – VN) tools which is still located here, although I’m planning to significantly improve it some day.

I wrote this tutorial to one of my Internet friends with whom we had intensive chat for several months (which resulted in more than 200 forum posts, some of which were 60-90 KiB in size – pure ANSI). This guide is intended to give an all-round view of how reverse-engineering (RCE) is performed. It requires no knowledge learnt beforehand – maybe except for more or less common mechanics of how computer works and what WinAPI is. You don’t even have to be able to write assembly code – you’ll learn this and more things as you go through the pages.

It’s ironic that none of the people (by the time of this writing – two) whom I’ve send this guide to actually completed it – albeit they’ve asked themselves if I can teach them some hacking stuff. In fact, I don’t know if they have started at all, haha… Well, nobody is to be blamed for this, of course.
But, still, I would highly appreciate any feedback that you might drop in the comments!

Oh, and yes, if you spot a typo or a mistake while reading the tutorial please select it in your browser’s window and press Ctrl+Enter – it’ll send a message to me so I can fix it. Thanks!

Now without further ado let’s dive into the world of hacking…

Part 1 – the Bruteforce – let’s start! »

** Check out my newer series of tutorials at lolex.org! **

P.S. thanks to someone from Moscow who’s sent me about 50 typo reports – I’ve fixed them all, thanks a lot, pal :)

Chapters

  1. Foreword;
  2. Part 1 – the Bruteforce;
  3. Part 2 – IDA assembly;
  4. Part 3 – finding Clues and The Case;
  5. Part 4 – getting to the Crash Point;
  6. Part 5 – the final act;
  7. Epilogue.

The files

  1. ScenarioRunner – our subject.
  2. WinAPI help files (WIN32.HLP is the main file) – desk reference of a Win32 hacker.
  3. Intel Opcodes & Assembler Instructions – help docs.