I'm interested in using something like OllyDbg to examine a program that potentially has Trojan-like characteristics.
Does anyone know any good tutorials on how to do this safely?
Basically the program is a "bot" for a video game, but I suspect that it has back doors and/or will upload information it gathers (such as passwords) to a remote server.
I'd like to find the URLs or IPs it attempts to connect to, prevent it from doing so, etc, so I guess this is a little more specific than the typical "cracking" of a program; I'm mostly interested in ferreting out network-based things it might be doing and either preventing them, or fool it into thinking it was successful.
Also, I'm curious about how to snoop on encrypted network traffic. How can I determine the encryption keys and algorithms a program uses to encrypt what it sends across the network? (I ask, because I am interested in creating a 3rd party client to emulate communication with a game server, and I can't do that without knowing how to discover the keys being used)