HACK STEPS (continued)
■
Identify the methods exported by the control and its subcomponents,
and also any interesting operating system functions which the control
imports — in particular, any cryptographic functions. Set breakpoints on
these functions within the debugger.
■
Do'stlaringiz bilan baham: