diff --git "a/stack_exchange/RE/Comments.csv" "b/stack_exchange/RE/Comments.csv" new file mode 100644--- /dev/null +++ "b/stack_exchange/RE/Comments.csv" @@ -0,0 +1,12892 @@ +Id,PostId,Score,Text,CreationDate,UserDisplayName,UserId,ContentLicense +26886,17093,0,"Thanks for your answer! Very interesting, I would never have seen this. What do you think, what are the arguments meaning and what do I have to do to call that function from external? The only thing I want is to play the animation for myself.",1/1/2018 21:14,,22767,CC BY-SA 3.0 +26887,17094,2,"It's ""some other explanation"": decompilation is still guesswork. It helps, for stock functions that do standard things, but as soon as you go ""WTH!?"", it's time to take a look at the original disassembly.",1/1/2018 22:28,,2959,CC BY-SA 3.0 +26888,17054,0,"You are correct. You may be able to backtrace where the registers have been referenced, however these registers contain addresses often obtained from some library, or e.g., an array of listeners, comparison functions etc. and backtracing ranges from hard to impossible. IDA solves the problem by trying to disassemble everything that might look like a subroutine, while Olly or x64 will try to dissasemble everything. That's why they have the ""Analyze selection"" or ""Remove analysis"" options - in case they guess wrong about the location of data/code.",1/1/2018 22:34,,22648,CC BY-SA 3.0 +26889,17094,4,show us the asm.,1/1/2018 23:15,,60,CC BY-SA 3.0 +26890,17097,0,"This worked great. Thank you so much. I was looking for it in the menu bar, but wasn't finding it. It's apparently in Edit -> Functions -> Change stack pointer... (Found it by looking for the shortcut Alt+K)",1/2/2018 7:27,,22775,CC BY-SA 3.0 +26893,17101,0,doh! how could I miss that!,1/2/2018 17:45,,22783,CC BY-SA 3.0 +26895,11752,0,@Antimony would using dynamic instrumentation such as Frida be of any use here?,1/2/2018 19:10,,16976,CC BY-SA 3.0 +26896,17100,0,"Thanks for your answer! Yes, I was talking about dynamic analysis. Do you think that a logging script like this: https://github.com/deresz/funcap , which is for IDA Pro, can track the x86 registers values for a non-hardcoded generated key? What I'm trying to understand is ""unique key generation"" vs ""generation of lots of compatible keys"". And if a unique generated key can be tracked among the x86 registers values.",1/2/2018 21:56,,22772,CC BY-SA 3.0 +26898,17100,0,"The best answer I can give you is ""maybe."" Your hands are now dirty enough that you can dive in and see what you come up with. There's just a lot of nitty-gritty details on an individual binary basis where no generic answer can apply. If you're trying to reverse the algorithm used for a dynamically-generated key, then there's no telling what kind of algorithm you're dealing with. By all means, find an automated solution and churn your binary through it, but with what you're asking for, there's not a one-size-fits-all solution. Also, again, registers aren't the only thing to keep track of.",1/2/2018 22:36,,20928,CC BY-SA 3.0 +26899,17100,0,"I'm a total newbie. I just want to find a crackme to see an example of x86-register-value logging when the key is unique and generated, not hardcoded.",1/2/2018 23:42,,22772,CC BY-SA 3.0 +26900,17103,0,"This ""scanf return int value representing the total input chars from stdin"" is most certainly not what that page says. It returns the *successfully matched and assigned* number of arguments. What is the format string for this `scanf` string? If it's something like `""%d""` then `0` is a correct result, with your input.",1/2/2018 23:44,,2959,CC BY-SA 3.0 +26901,17100,0,Try inquiring on the Tuts4You forum. Someone there may be able to satisfy exactly what it is you're looking to achieve: https://forum.tuts4you.com/,1/3/2018 1:15,,20928,CC BY-SA 3.0 +26903,17104,0,Did you check the stack directly for possible return addresses? Sometimes the callstack cannot be retrieved properly.,1/3/2018 9:19,,2221,CC BY-SA 3.0 +26904,17104,0,"There are no addresses on the stack, I dont know why",1/3/2018 10:19,,22599,CC BY-SA 3.0 +26905,17104,1,Is EIP perhaps set to an invalid memory location?,1/3/2018 10:53,,2221,CC BY-SA 3.0 +26906,17104,0,"Uh yeah, that could be it",1/3/2018 11:17,,22599,CC BY-SA 3.0 +26907,17093,0,"Well, I guess the first parameter is some player/game structure. +That game structure dereferenced at offset +0x1C is another structure holding the array of animation ids beginning at +0x4. +The second parameter is the animation index you want to use. + +The game structure stored in the first parameter also contains the current animation id (+0x8).",1/3/2018 15:35,,22769,CC BY-SA 3.0 +26908,17093,0,"Now, to reverse engineer the calling convention, I'd first start to collect hints inside of this function: +- ecx is not used as first parameter, because it is overwritten right at the beginning => hence neither __thiscall nor __fastcall +- function does not deallocate function arguments on the stack => hence not __stdcall + +So my first guess would be __cdecl, but to further strengthen this assumption you could breakpoint the function (push ebp) and look at how it's called (see callstack).",1/3/2018 15:46,,22769,CC BY-SA 3.0 +26909,17093,0,"Awesome, thank you andrew! I've called the function with the given player pointer and with the jump-animation-state. When calling ingame, the player only ""flickers"". Like it's only playing the first frame of the animation. Do you have any idea about this? You really helped me a lot! :-)",1/3/2018 19:41,,22767,CC BY-SA 3.0 +26911,16788,0,"I'm seeing patterns based on bit shifting, XOR, and block numbers. The patterns show if you XOR the unec/enc files and then XOR each 28-byte block with the previous block, then look at it as a matrix of 224 1-bit columns. +I can identify 128-bit patterns but looks like there are 256-bit patterns as well. Please provide the unenc/enc files and key for a file at least 8192 bytes long. +You also mentioned a 7-digit key saved in a config file. Please provide that for the files. I have a feeling these 7-digits pick the ""algorithm"" used. 7*32 bits = 28 bytes which is the ""block"" size.",1/3/2018 20:38,,2741,CC BY-SA 3.0 +26912,17107,0,That has been raised as issue and [reportedly has been fixed](https://github.com/radare/radare2/issues/7500).,1/3/2018 23:49,,2959,CC BY-SA 3.0 +26913,17109,0,Do you know what the purpose is from a prologue/epilogue?,1/4/2018 13:49,,2959,CC BY-SA 3.0 +26915,17110,0,"You have to make sure that your compiler is compiling as the same ""bitness"" (don't know the correct word) as the payload you are trying to run. If you compile the injector as 64 bit, your payload also has to be 64 bit. Same goes for 32 bit applications",1/4/2018 14:58,,22799,CC BY-SA 3.0 +26916,17109,0,"What this prologue code does is save the stack frame address. Later on at the end of the function, in the epilogue code, the stack frame gets restored again. You can disable this behaviour in the compiler flags if you wish.",1/4/2018 15:02,,22799,CC BY-SA 3.0 +26917,17110,0,what exception?,1/4/2018 15:20,,18014,CC BY-SA 3.0 +26918,17110,0,@PawełŁukasik: Unhandled exception at 0x00007FF64224103C in PE_execute.exe: 0xC0000005: Access violation reading location 0x00000000422540E8,1/4/2018 15:36,,22797,CC BY-SA 3.0 +26920,17112,0,"MSDN says, In a valid PE file, the Signature field is set to the value 0x00004550, which in ASCII is ""PE00"". A #define, IMAGE_NT_SIGNATURE, is defined for this value. This is applicable for 32bit files or 64bits as well. My image hex look like this.. [link] (https://1drv.ms/i/s!AgQa8i37A0sigoIZPkX6dAmx4bOJMA). I have to change to 64 bit instead of 32 on hex editor when i am copying.",1/4/2018 16:09,,22797,CC BY-SA 3.0 +26921,17112,0,Please note that the above rawData[ ] is NOT full hex value.,1/4/2018 16:11,,22797,CC BY-SA 3.0 +26922,17113,0,"That is quite specific for Microsoft's compiler – which indicates that without, it will generate a prologue/epilogue *even when not needed*. I dare say there is another, better reason.",1/4/2018 16:51,,2959,CC BY-SA 3.0 +26924,17114,0,"Just checked example MemoryModule seems work on 32bit version. Can not select X64 from visual studio to compile.So, it is 32 bit version only?",1/5/2018 3:30,,22797,CC BY-SA 3.0 +26925,17113,0,"No, it disables prologue/epilogue generation it /Oy specified. And this is default behavior for the Release build. But you may specify /Oy- if you still want prologues in release code.",1/5/2018 9:36,,22324,CC BY-SA 3.0 +26927,17123,0,"Thanks for answer, I have tried those base addresses and after press 'c' I get same result, but does not appear all functions, then I select all file and press 'c' again and functions seems to be garbage again. The offset I check for confirm the functions are ok is 0x00104968 in plain file, this offset is a 0x70 key that must be xored. Here is the file https://file.town/download/vwy508j3uyljbgybp3vtx8gqo",1/5/2018 13:03,,3253,CC BY-SA 3.0 +26929,17120,0,"Though I checked up on Tomb Raider Forums, I couldn't find an answer about this issue. I also made a topic about this but unfortunately they don't know either. What ways should I follow to add this with Reverse Engineer? Is there any guide for this? And with which program I can put it through?",1/5/2018 15:58,,22803,CC BY-SA 3.0 +26930,17123,0,"I found xor key offset, 0x00104968 ^ 0x00106170, at least it makes xor with this offset, need to find out entry point for check more coincidences...",1/5/2018 18:28,,3253,CC BY-SA 3.0 +26931,17120,0,"Unless someone has developed a custom tool for that file type, it's not going to be as simple as feeding it through a particular program, unfortunately. The other forums I link to in the other reply I noted, XeNTaX and ZenHAX, are the two communities out there that deal specifically in reversing file formats, so sign up there and inquire. If they can't help you, then I'd recommend a different approach, like perhaps a DLL injection where you hook a function related to the messages that appear on the screen. That also isn't a trivial matter for beginners, unfortunately, but you can research.",1/5/2018 22:08,,20928,CC BY-SA 3.0 +26932,3365,0,For some reason I can't unRAR `PEid`. Windows Defender removes it as malware.,1/5/2018 22:23,,14864,CC BY-SA 3.0 +26937,10929,0,"@pixar great tool, too bad it is not maintained anymore.",1/6/2018 13:27,,3469,CC BY-SA 3.0 +26939,17131,0,"First, remove the sticker from the chip to get the part's ID so we can look up the data sheet and help you. At first glance this looks like a Kevo Hub for smart locks with a Power plug, a Ethernet port and an antenna mount. +You'll be most likely dealing with an ARM SoC given the size of what I see.",1/6/2018 17:18,,4437,CC BY-SA 3.0 +26940,17114,1,[Comments in the codebase](https://github.com/fancycode/MemoryModule/search?utf8=%E2%9C%93&q=_WIN64&type=) indicate it supports 64-bit. You'll have to add this as a build target yourself if you don't see it in Visual Studio.,1/6/2018 18:54,,161,CC BY-SA 3.0 +26943,17135,0,"@SYS_V after downloading the executable, run it, there is an option which you can write the raw binary to a file.",1/6/2018 21:00,,17760,CC BY-SA 3.0 +26944,17137,2,Maybe a better start for you would have been taking the [tour] on signing up. Read the [help] for tips on how to ask a good question.,1/7/2018 1:02,,2959,CC BY-SA 3.0 +26945,17134,0,The chipset is ARM powered,1/7/2018 4:44,,3644,CC BY-SA 3.0 +26946,17131,0,"you are right about the kevo plus, the chip indeed is an ARM CPU https://www.digikey.sg/product-detail/en/nxp-usa-inc/MK60DN512VLL10/MK60DN512VLL10-ND/3743034",1/7/2018 4:49,,3644,CC BY-SA 3.0 +26947,17134,0,"I am a complete newbie to this, I assume I probably need to solder some connector pins onto that J2. Then I will need some type of cable to connect to a computer?",1/7/2018 5:01,,3644,CC BY-SA 3.0 +26948,17136,1,"I was wondering how to set a hardware breakpoint like that although I didn't know what it was called. Also, I was trying not to cheat too much by looking at the source code so I didn't notice that #define either. Very cool!",1/7/2018 6:35,,3872,CC BY-SA 3.0 +26949,17137,0,check if there's no decrypt method somewhere near those strings,1/7/2018 11:53,,18014,CC BY-SA 3.0 +26950,17131,0,as numind suggest you should download datasheet/pinout and look which pins are connected to the connectors. Also take a look at this [Thought I found serial port - broke embedded device instead! Help?](https://reverseengineering.stackexchange.com/a/12824/4709) see both answers,1/7/2018 12:17,,4709,CC BY-SA 3.0 +26951,17137,0,I don't think so.. I don't know.. and if I press that dot (from .(xxxxxx)) it moves me to another module (http://paste.org.ru/?cr0e3k if you wonder what module) I'am tottaly lost..,1/7/2018 12:50,,22793,CC BY-SA 3.0 +26953,17137,0,"negative numbers? they look very similar, anyway, it should be easier discovering the code.",1/7/2018 15:50,,15579,CC BY-SA 3.0 +26954,17135,0,BIOS are encrypted nowadays....it will be much more work than feeding it raw to a disassembler.,1/7/2018 15:51,,15579,CC BY-SA 3.0 +26956,17137,3,"I don't understand what you are asking, to be honest.",1/7/2018 16:39,,18317,CC BY-SA 3.0 +26957,17137,1,What are those numbers? Are they possibly (quite simply) the *address* where those expected strings are stored?,1/7/2018 16:53,,2959,CC BY-SA 3.0 +26959,17137,0,"I don't know exactly, just I know that in that place for example .(724934127) should be filename.dll -- I don't know how to see it.. (here is the code: http://paste.org.ru/?0neyqg that I need to ""uncrypt"", as you can see there are many numbers with .(xxxxxx))",1/7/2018 17:31,,22793,CC BY-SA 3.0 +26960,12870,0,How do you mean it starts at `0x80000180` when file is `0x78cb03` long ?,1/7/2018 18:45,,3810,CC BY-SA 3.0 +26961,17137,0,"I presses that dot and got a popup ""Cut | Copy | Define | Share"". What software are you using?",1/7/2018 19:30,,2959,CC BY-SA 3.0 +26962,17137,2,where is this code from?,1/7/2018 20:06,,60,CC BY-SA 3.0 +26963,17104,0,What's the actual issue you're having? This feels like an XY problem. Question could definitely use more detail and explanation.,1/8/2018 2:26,,13379,CC BY-SA 3.0 +26964,17110,0,Have you debugged the program..? What's Signature pointing to? Doesn't really seem related to SRE,1/8/2018 2:33,,13379,CC BY-SA 3.0 +26969,17110,0,Clearly x64 - NT memory pointing something out of bound. Please x86 and x64 comparison (Debug mode). Pls refer the link [x86](https://1drv.ms/i/s!AgQa8i37A0sigoInf6UO-EzAw6xJHg) and [x64](https://1drv.ms/i/s!AgQa8i37A0sigoIoMY___a2gDrJzDw).,1/8/2018 7:19,,22797,CC BY-SA 3.0 +26970,12870,0,"I mean it as a virtual address. If you want to analyse it, you have to set the starting offset to `0x80000180` and the absolute addresses will point to the right places.",1/8/2018 7:43,,12325,CC BY-SA 3.0 +26971,17142,0,"This parsing seems corrupted in my opinion. If you open each node, you will see they're all padding or empty. It makes no sense. Don't you agree? Or am I missing something?",1/8/2018 8:21,,17760,CC BY-SA 3.0 +26972,17142,0,There are enough valid modules so it's fine.,1/8/2018 8:22,,60,CC BY-SA 3.0 +26973,17143,0,Please mark your answer as accepted :),1/8/2018 8:42,,18698,CC BY-SA 3.0 +26975,17148,0,"Yes, but the goal is to detect tampering with the license check function. That's why I nopped the license check function to check if the protection is working. By nopping this function, it has changed so I would expect that the hash is different, but it isn't.",1/8/2018 9:27,,15916,CC BY-SA 3.0 +26976,17148,0,I edited the code to make it a bit more clear what I mean.,1/8/2018 9:41,,15916,CC BY-SA 3.0 +26977,17148,0,this question nor my answer appears to have any relation to reverse engineering your edited code appears to have logic errors (it will never reach license check nor will it ask for a cin << but always print fail) please consider asking at code review or SO,1/8/2018 10:20,,3473,CC BY-SA 3.0 +26979,17147,0,@blabb try it on OS X,1/8/2018 12:21,,60,CC BY-SA 3.0 +26981,17147,0,@igor since you recommend to try osx illl assume it is possible to delete files in use in osx so deleting my earlier cimment,1/8/2018 12:56,,3473,CC BY-SA 3.0 +26984,17145,0,"So mov qword [rbp - 16], rax moves the NSString into rax?",1/8/2018 14:44,,22837,CC BY-SA 3.0 +26985,17127,4,I'd love to see someone offer an approach to this. Maybe consider starting a bounty at this point to garner more interest from the heavy-hitters?,1/8/2018 16:08,,20928,CC BY-SA 3.0 +26986,17145,0,"It's the other way around. `mov qword [rbp - 16], rax` moves the value in `rax` into the stack memory. `rax` holds the value returned from the objc call which is a pointer to a NSString instance",1/8/2018 17:59,,14715,CC BY-SA 3.0 +26988,17137,0,1. I use JustDecompile 2. It's WarGods anti-cheat (http://www.wargods.ro/wcd/download.php) - I need to get the cheat list..,1/8/2018 18:38,,22793,CC BY-SA 3.0 +26991,17154,0,"Wasn't QuickBasic called `qb.exe`? I remember using both `bc.exe` (Borland C) and QB, without having to add paths. Also, QuickBasic was a product in itself – I've never seen referred to it as ""Microsoft's Basic Compiler"". OTOH: that [wikipedia](https://en.m.wikipedia.org/wiki/QuickBASIC) startup screen shot looks eerily familiar ...",1/8/2018 20:21,,2959,CC BY-SA 3.0 +26993,17154,0,The professional version of MS-DOS BASIC was called PDS (Professional Development System) and it's last version was 7.1 I still use it because I still have clients who run my DOS version of my accounting package. It's compiler is BC.EXE. What exactly are you looking for? A sample program to decompile?,1/9/2018 2:30,,22854,CC BY-SA 3.0 +26994,17158,0,"there are multiple firmware download links on the SensorTag Firmware page. Which firmware image are you actually working with? In other words, provide the direct download link and md5sum",1/9/2018 4:24,,18317,CC BY-SA 3.0 +26995,17145,0,"so why is there a `mov rax, qword [ rbp - 16 ]`? wouldnt that be the opposite?",1/9/2018 4:39,,22837,CC BY-SA 3.0 +26996,17127,0,@dsasmblr: Here you go. Wiped out on the points. Hopefully someone can answer it.,1/9/2018 4:56,,14864,CC BY-SA 3.0 +26997,17145,0,"Yes, first it saves the return value to memory and then loads it back up into `rax`. The compiler is just basically translating operations it has identified without trying to optimize anything which is why it is so inefficient.",1/9/2018 5:23,,14715,CC BY-SA 3.0 +26998,17159,0,"Did you ""Apply patches to input file""?",1/9/2018 6:14,,14622,CC BY-SA 3.0 +26999,17159,0,"@sudhackar IDA Free is only IDA 5.0, I dont have that option.",1/9/2018 7:13,user22856,,CC BY-SA 3.0 +27000,17159,0,Then you can manually patch the file using a hex editor. I don't know of other options in IDA free.,1/9/2018 7:15,,14622,CC BY-SA 3.0 +27001,17143,0,Waiting for the new day :).,1/9/2018 7:21,,19684,CC BY-SA 3.0 +27002,17161,0,Yes I am well aware of this. Maybe I wasn't clear in my question. I want to run the patched binary to test it. Does IDA not run from the database? I don't want to export a dif without knowing it works.,1/9/2018 7:56,user22856,,CC BY-SA 3.0 +27003,17161,1,No it can't. Just backup the original file and then apply the patches to either of them using one of the methods above.,1/9/2018 8:00,,18698,CC BY-SA 3.0 +27005,17164,0,"You are right. That's why I used the term ""some sort of"" since the shift isn't constant. It will be more accurate to say ""some sort of Substitution cipher"".",1/9/2018 15:17,,18698,CC BY-SA 3.0 +27006,17158,1,Thanx. Changed to direct link to v 1.5. MD5: 6039897a3d9b111ca5b139055162eb6c,1/9/2018 19:57,,22836,CC BY-SA 3.0 +27007,17165,0,I'm not sure if `SystemSettingsThresholdAdminFlowUI.dll` is even mapped into `C:\Windows\ImmersiveControlPanel\SystemSettings.exe` process at the time.,1/10/2018 3:59,,14864,CC BY-SA 3.0 +27008,17165,0,You can check that with e.g. Process Explorer but you could be right that it's calling this api in another way.,1/10/2018 9:49,,99,CC BY-SA 3.0 +27010,17165,1,"Do debug a UWP app you will have to use PLMDebug, you can use windbg or x64dbg for that.",1/10/2018 15:29,,2221,CC BY-SA 3.0 +27011,17087,0,"Thank you @blabb for your answer. I apologize for the late response, some of this is beyond my skill set in OllyDbg but I plan on returning to this when I have more experience in the program.",1/10/2018 23:39,,21084,CC BY-SA 3.0 +27012,17165,0,"@mrexodia: Well, yeah, obviously you need to use PLMDebug to turn off `Process Lifetime Management` on UWP app. In other words, so that it doesn't get suspended by the broker when it's in the background. But you don't debug with it, per se. It's not a debugger.",1/11/2018 6:42,,14864,CC BY-SA 3.0 +27014,17174,0,"Seems to me like a powershell thing and not IDA. Try executing `.\ida.exe` , or use the full path and an ampersand sign: `& ""C:\Program Files\IDA 7.0\ida.exe""`",1/11/2018 13:16,,18698,CC BY-SA 3.0 +27015,16388,0,"@takumar, any news about the issue you've reported? If the issue isn't solved yet, please share link to the Github issue you've reported.",1/11/2018 13:28,,18698,CC BY-SA 3.0 +27016,15895,0,"Hy @Megabeets sorry about that, I've been quite busy with life, I marked your answer as accepted :)",1/11/2018 14:08,user20964,,CC BY-SA 3.0 +27017,17131,0,"Be sure to try those test points, and other potentials, to see if you have an accessible RS232 (serial) connection. Find a 3.3v source and then check for I/O from the pins/points, which may appear as garbage. From there, determine the baud rate in use so you aren't getting garbage. Hopefully it isn't encrypted or otherwise disabled. A good serial shell may allow you to dump the FLASH or otherwise interact with the OS in easier ways. Case in point, look where I found serial on this little router years ago: https://bitsum.com/openwiking/owbase/WL530G/",1/11/2018 16:28,,1563,CC BY-SA 3.0 +27018,282,0,New link: http://octopuslabs.io/legend/blog/sample-page.html,1/11/2018 18:20,,3527,CC BY-SA 3.0 +27023,16388,0,This was filed as [issue #8589](https://github.com/radare/radare2/issues/8589). I don't know the status of it since I had apparently little success in pushing the associated test case to get merged.,1/12/2018 14:33,,21696,CC BY-SA 3.0 +27024,1900,0,"For any looking for the Principal Component Analysis and SCA paper justsome mentioned (link is now broken), try here: http://www.ru.nl/publish/pages/769526/principal_component_analysis_and_sca_-_jip_hogenboom.pdf",1/12/2018 14:42,,1854,CC BY-SA 3.0 +27026,14149,0,Can you be more specific ?,1/12/2018 15:45,,12383,CC BY-SA 3.0 +27027,17181,0,did you try to open the file with pe explorer ?,1/12/2018 16:47,,12383,CC BY-SA 3.0 +27028,17185,1,Frida may be of interest to you: https://www.frida.re/,1/12/2018 20:56,,20928,CC BY-SA 3.0 +27029,17185,0,"there is what is called js prettifier, see this it may be helpful : https://w3guy.com/online-javascript-code-beautifier/",1/12/2018 20:57,,12383,CC BY-SA 3.0 +27030,17187,0,please provide a link to the firmware. Also describe what device the firmware is for.,1/12/2018 22:55,,18317,CC BY-SA 3.0 +27031,17186,0,What tool are you using? It would really be useful to know that.,1/12/2018 23:51,,2959,CC BY-SA 3.0 +27032,17187,0,What makes you think there should be more?,1/12/2018 23:53,,2959,CC BY-SA 3.0 +27033,3799,1,-1 this does not answer the question and should not be the accepted answer. OP asked about `\??\` and not `\\?\`,1/13/2018 1:03,,22896,CC BY-SA 3.0 +27034,17186,0,@usr2564301 looks like IDA...,1/13/2018 11:20,,60,CC BY-SA 3.0 +27038,17187,0,Where is the file system?,1/13/2018 15:55,,14092,CC BY-SA 3.0 +27039,17187,0,Let the original binary file for check it...,1/13/2018 17:07,,3253,CC BY-SA 3.0 +27041,3799,1,"You're absolutely right. I wasn't able to delete my answer because it was already marked as accepted, but I edited it to reflect the correct answer.",1/13/2018 19:02,,1562,CC BY-SA 3.0 +27042,17190,0,"Thanks for your answer, but imho you're wrong. +IDA Pro supports officially [Dalvik bytecode disassembling and debugging](https://www.hex-rays.com/products/ida/support/tutorials/debugging_dalvik.pdf). +Moreover it's a simple _search_ feature in already available data... I'm not asking for the moon!",1/14/2018 10:19,,18096,CC BY-SA 3.0 +27047,17196,0,look at the sections using `readelf -SW `. Run `file` against it. etc,1/15/2018 3:43,,18317,CC BY-SA 3.0 +27049,17200,0,Great answer! I'll make sure to review the code examples and references - kudos.,1/15/2018 15:31,,22648,CC BY-SA 3.0 +27050,16788,0,"@David Nice, thanks so much for your work! Sorry it took me a while to get back to you. Here the plain png: [12034 Bytes](https://pastebin.com/YuYmS32M). [Here](https://pastebin.com/vQaG7ca1) the crypted png + associated infos. I have added the key from the config, as it changes on file creation I am not sure if the key is used and then updated or the other way around, thus I added both. I also confirmed (using procmon) that the file is only accesed once during creation of the file. edit: typo",1/15/2018 16:52,,22301,CC BY-SA 3.0 +27051,17201,0,What kind of compilation options/steps lead to an ELF file lacking a section table? Is there any way to dump the contents of DT_SYMTAB to read the mappings from symbol -> function?,1/15/2018 19:26,,1695,CC BY-SA 3.0 +27052,17201,0,"I think some toolchains default to no section table to save space, but I don’t know the details. In theory readelf has all the information needed to dump the symtab, I’m not sure why it’s not doing it (probably nobody got around implementing it). it has the same format as the standard elf .symtab, so you just need to map the virtual address back to the file offset using the program headers.",1/15/2018 19:48,,60,CC BY-SA 3.0 +27053,17201,0,@David see edit.,1/15/2018 19:54,,60,CC BY-SA 3.0 +27054,17200,0,"Yes, thank you. This answer is closer to answering my original question. (Your other answer is about global hooks. Unfortunately in this case you won't be able to do much with them. I can as well find a click on the UWP app's window, i.e `Windows.UI.Core.CoreWindow` by trapping a mouse click event in its WndProc with IDA. Unfortunately, it's not easy to proceed further on from that point. Or how to get to [this class](https://docs.microsoft.com/en-us/uwp/api/windows.ui.core.corewindow) that can help route the call further from a button click.)",1/15/2018 21:42,,14864,CC BY-SA 3.0 +27055,17200,0,"Also just answering these: 1) Finding out how is UWP app written -- XAML, JavaScript, C++, C#, VB? That will dictate further steps. Then 2) For most languages, except C++, one can get the app's code with ReSharper, or Telerik's JustCode. That part is somewhat easy. The harder one is compiled C++ code, which I suppose `C:\Windows\ImmersiveControlPanel\SystemSettings.exe` is. In this case, I'm assuming one has to use IDA, OllyDbg, or x64Dbg low level debugger. And that's where my question remains -- getting to the code of the mouse click in those debuggers.",1/15/2018 21:52,,14864,CC BY-SA 3.0 +27056,17200,0,"I also found those other modding sites that you linked to myself. I even tried to get hold of the author of the post at the unknowncheats site for further details, but failed. So modding info definitely helps for debugging/reversing here, at least one can locate all the pieces of the UWP app. What also helps, is disabling `Process Lifetime Management` like was suggested in the other answer, before even attaching to a UWP process. Otherwise IDA may hang up with no explanation why, when UWP process broker suspends the UWP app in the background.",1/15/2018 21:56,,14864,CC BY-SA 3.0 +27057,17203,0,What do you mean to define a struct ? you mean a C/C++ struct ? I see it stowed in Data Segment.,1/16/2018 0:58,,12383,CC BY-SA 3.0 +27058,17203,0,Yes a c style struct. Are you familiar with IDA Pro how you can press a key and define a c style struct and then apply it to offsets like that so that they are properly labeled,1/16/2018 1:00,,18507,CC BY-SA 3.0 +27059,17200,1,I'll mark it as the answer so that you can receive the bounty for your work. I just want to point out that there's more to it left to be done. Can you contact me [via email](https://reverseengineering.stackexchange.com/users/14864/c00000fd?tab=profile)? I'll post an update here when I get it resolved.,1/16/2018 1:45,,14864,CC BY-SA 3.0 +27060,17200,1,"Thank you **c00000fd** ! Had been working overtime a lot these few days (working even this weekend) and hence did not have time to work on the actual ""Restart"" button in the Windows Update that you were mentioning. Hopefully in the next few days I will be able to create a solution for that exact ""Restart"" button issue and update it here. Will also email you as requested. @barnaby-b - Thank you for the compliment!",1/16/2018 4:35,,18402,CC BY-SA 3.0 +27062,17199,0,"Thank you, that's helpful. What is a few binaries that Binwalk extracted from source binary?",1/16/2018 11:27,,14092,CC BY-SA 3.0 +27063,17199,0,I don't know exactly. May be some configuration file.,1/16/2018 11:55,,12325,CC BY-SA 3.0 +27065,17211,0,buts its about malware sample unpacking and malware analysis,1/16/2018 13:00,Bruteforce ,,CC BY-SA 3.0 +27066,17211,0,"Nothing to do with information security, its about reverse engineering !",1/16/2018 13:01,,13977,CC BY-SA 3.0 +27067,12292,0,"Entropy of file ""SlingboxSoloFwV2_1_110HwV1_0_3Current.bin"" does not show a kind of compressed filesystem, rather shows plain data with code structure, strings and so on...",1/16/2018 16:43,,3253,CC BY-SA 3.0 +27069,17200,1,"Awesome job, TechLord, and great feedback and attitude towards this whole thing, c00000fd! I hope to see you follow through with that Restart button solution, TechLord. Also, would quite enjoy an update from you as well once you get things pinned down, c00000fd. Thanks, both of you!",1/16/2018 18:13,,20928,CC BY-SA 3.0 +27072,17198,0,"Plus every web page you can find on the PE format (some esoteric tidbits are quite rare). And be very confident in your assembler skills. And, for software for Windows, know enough about its APIs to be able to find what you are looking for on MSDN.",1/16/2018 23:18,,2959,CC BY-SA 3.0 +27076,17219,0,"Yes, thank you! Now I see that this firmware contains some separate modules that cause this conflict.",1/17/2018 6:21,,22926,CC BY-SA 3.0 +27079,17222,0,do you have a piece of code with this instruction used? post a hexdump and the disassembly before/after it. Maybe post the binary if you can share it.,1/17/2018 12:39,,60,CC BY-SA 3.0 +27080,17224,0,Its loading one byte from memory address pointed by value stored inne eax. Ecx = (char)*eax,1/17/2018 16:16,,8133,CC BY-SA 3.0 +27082,17226,1,"If the addresses are correlated, it might be because of different base addresses. Please compare the output of `readelf -l | grep LOAD` to the output of `f~LOAD0` from radare2. You can also check radare's base address using `e bin.baddr`. To rebase, use `r2 -B <0xaddr> `.",1/17/2018 18:21,,18698,CC BY-SA 3.0 +27084,17226,0,No instance of 'LOAD' found by r2 or readelf. It seems the base address used by r2 is 0x0800000. This explains part of the problem. BTW I found your posts about 'Gameboy' and 'Simple Crackme' to be very helpful and interesting.,1/17/2018 19:03,,22938,CC BY-SA 3.0 +27085,17226,0,Thanks! Mind to share the binary? It will help us understand better.,1/17/2018 19:14,,18698,CC BY-SA 3.0 +27087,17204,1,"It might help out to publish some of the waveforms you are looking at and what you are demodulating it to. For DPIWM, you need to know how big the alphabet is, i.e. how many bits are being used to encode the mark interval and how many are being used for the space interval. For a M-bit encoded input, you generally have M/2 bits used for mark and M/2 for space so the period of one frame is (mod(x/2^(M/2))+1) + (rem(x/2^(M/2))+1) time slots.",1/18/2018 4:27,,14715,CC BY-SA 3.0 +27088,17226,0,That file is actually a linux kernel module (.ko) for MIPS architecture. I pulled it from my router. 'modinfo' shows that the file license is 'proprietary'. I'm not sure if I am allowed to share it. Any idea?,1/18/2018 7:54,,22938,CC BY-SA 3.0 +27092,9029,0,"Had the exact same problem, RefreshDebuggerMemory at the top of the callback does indeed resolve the issue.",1/19/2018 0:14,,22946,CC BY-SA 3.0 +27100,17056,0,"You have addressed what I wanted to know with an in-depth detail, thanks!",1/19/2018 10:50,,15185,CC BY-SA 3.0 +27102,17224,0,"and it will become 0xFFFFFFxx only if the bit 7 of [eax] is set, otherwise it will be 0x000000xx. The point being that the array being read has been defined as a signed char *",1/19/2018 21:15,,1323,CC BY-SA 3.0 +27106,17081,0,EIP is the actual address of running code. Keep doing well :),1/21/2018 0:56,,12383,CC BY-SA 3.0 +27108,17243,0,"Line-A and Line-F instructions have been used for years to implement custom hooks for system calls. On the Atari ST, for example, Line-A was used to draw graphics. In the old MC68K Mac OS, Line-F was extensively used for all kinds of OS stuff - mostly undocumented. Hence OP's question.",1/21/2018 15:12,,2959,CC BY-SA 3.0 +27109,17222,0,"Agree with the above. Without seeing the source, it might as well be a disassembly error.",1/21/2018 15:17,,2959,CC BY-SA 3.0 +27110,17222,0,"Indeed. Looking at the source of my disassembler, it's decoding a PC-relative address incorrectly, fetching non-code data, and trying to decode that.",1/21/2018 22:15,,12260,CC BY-SA 3.0 +27111,17243,0,"Indeed, my original suspicion was that I'd encountered some undocumented Line-F OS service. Alas it turned out I had a bug in my 68k disassembler that was causing it to spuriously decode data as machine code.",1/21/2018 22:17,,12260,CC BY-SA 3.0 +27114,17246,1,x64dbg uses [x64dbg](http://www.capstone-engine.org/) as its disassembly backend. You can check out the project and maybe use python to script such a solution which will recursively parse `call` to detect code sections.,1/22/2018 10:32,,14622,CC BY-SA 3.0 +27120,17246,0,Actually x64dbg uses ZyDis as the disassembly backend now. See https://x64dbg.com/blog/2017/10/18/goodbye-capstone-hello-zydis.html,1/23/2018 0:28,,2221,CC BY-SA 3.0 +27121,17246,0,If you plan to implement your own analysis this blogpost might be helpful: https://x64dbg.com/blog/2016/07/27/Control-flow-graph.html,1/23/2018 0:29,,2221,CC BY-SA 3.0 +27122,17095,0,"Nearly any crackme is what you'd call ""non-hardcoded"" one.",1/23/2018 1:17,,2147,CC BY-SA 3.0 +27130,17224,0,"I have one more question: Is the reconstruction to ""||"" correct?, or should it be a ""&&""?",1/23/2018 10:52,,22937,CC BY-SA 3.0 +27139,17262,3,"Binwalk's weakness is that it is signature based. What kind of functionality do you seek? Code segment detection? Visualization? ISA identification? One needs to utilize a combination of tools to make sense of an unknown binary. There is no single tool that does everything, and sometimes there is so little information available in the binary that not much can be done with any tool.",1/23/2018 23:24,,18317,CC BY-SA 3.0 +27140,17262,0,"@SYS_V thanks for bringing up those different stages, if you would elaborate on them and mention tools that can be used to help in those stages i would select that as a correct answer",1/24/2018 2:00,,22707,CC BY-SA 3.0 +27141,17246,0,"are you sure execution reaches this call i see an exception being generated prior to this call so you may need to look into the handler you may need to read about pdata , unwindinfo ,exception handling in x64 if you are using windbg .fnent will be your friend",1/24/2018 6:53,,3473,CC BY-SA 3.0 +27142,17224,0,"There is not enough context in the disassembly you gave to say definitively (i.e. where are the jumps going to and what code is being executed for each condition). In general for a null-terminated string/array, it would be `if (array[i] != 0 && i < MAXCOUNT)` -- AND instead of OR",1/24/2018 8:51,,14715,CC BY-SA 3.0 +27143,17268,0,thanks for answer and clarifying section vs segment but it's not exactly what I was asking about.,1/24/2018 9:12,,2936,CC BY-SA 3.0 +27144,17224,0,@cimarron the `jne` jumps right after the `jle`. The `jle` jumps to the function prolog. I know that usually it would be `if (array[i] != 0 && i < MAXCOUNT)` but to me it looks differently.,1/24/2018 9:12,,22937,CC BY-SA 3.0 +27145,17264,0,How can it 'maybe' help? What are the advantages over `binwalk`?,1/24/2018 10:10,,2959,CC BY-SA 3.0 +27147,17269,0,It looks like they have different calling conventions.,1/24/2018 10:27,,22023,CC BY-SA 3.0 +27148,17268,0,"the answer to your question is parse the section header table, as I said. See https://reverseengineering.stackexchange.com/questions/16829/disassemblers-resolving-elf-section-names/16830#16830",1/24/2018 11:06,,18317,CC BY-SA 3.0 +27149,17264,0,"Advantage is that it has own ""magic bytes"" list",1/24/2018 11:52,,3810,CC BY-SA 3.0 +27150,2933,0,"What is the function of the port on the typewriter? To use the machine as a teleprinter? If so, I would have thought it would be simply a case of finding the RX line and sending ASCII codes into it. There may be some control codes involved as well, the wikipedia page for Teleprinter has some info on these.",1/24/2018 12:13,,22992,CC BY-SA 3.0 +27151,17269,1,@armnostrong: You should have specified that you are dealing with ARM targets...,1/24/2018 13:08,,53,CC BY-SA 3.0 +27152,16826,0,"http://www.msreverseengineering.com/blog/2018/1/23/a-walk-through-tutorial-with-code-on-statically-unpacking-the-finspy-vm-part-one-x86-deobfuscation, https://www.welivesecurity.com/wp-content/uploads/2018/01/WP-FinFisher.pdf",1/24/2018 13:48,,18317,CC BY-SA 3.0 +27153,17270,1,thank you! i hope this helps lots of people that are starting out,1/24/2018 13:57,,22707,CC BY-SA 3.0 +27154,17270,2,"@pzirkind no problem, I hope so too. The fastest way to develop is through hands on experience. Good luck.",1/24/2018 13:58,,18317,CC BY-SA 3.0 +27155,15910,0,Why Im getting diferent binary when encrypting db_user_cfg.xml with openssl enc -aes-128-ecb -nosalt ?,1/24/2018 17:42,,3810,CC BY-SA 3.0 +27156,17276,0,https://stackoverflow.com/questions/9251568/what-is-a-badboy-in-reverse-engineering,1/24/2018 19:16,,18317,CC BY-SA 3.0 +27157,17276,4,I'm voting to close this question as off-topic because it is about colloquialisms,1/24/2018 19:18,,18317,CC BY-SA 3.0 +27158,17276,1,"@SYS_V what's the difference between a technical colloquialism, and ""terminology""",1/24/2018 19:20,,22669,CC BY-SA 3.0 +27159,17276,0,if it was about terminology instead of slang I would still vote to close,1/24/2018 19:25,,18317,CC BY-SA 3.0 +27161,17276,0,Welcome to RE.SE https://reverseengineering.stackexchange.com/help/privileges/close-questions,1/24/2018 19:30,,18317,CC BY-SA 3.0 +27163,3190,1,Unfortunately many of the links above seem not to be working anymore.,1/24/2018 21:03,,15579,CC BY-SA 3.0 +27164,17279,1,"There are `0xFF` bytes at those addresses. It's rather clearly not ""nothing"".",1/24/2018 23:10,,2959,CC BY-SA 3.0 +27165,17280,1,"I know IDA Pro can show `db ?`, which is also not ""nothing"" but not a defined byte either. Does radare2 do the same thing? If so, maybe you could add that, just for completeness.",1/24/2018 23:12,,2959,CC BY-SA 3.0 +27166,17276,2,"I recall that terminology in Lena151's reversing tutorials. When changing program execution program flow she designates the desired function calls / modules (like congratulatory dialog boxes) as ""good boy"" and the undesired calls/subroutines (like early exit) as ""bad boy""",1/24/2018 23:33,,1395,CC BY-SA 3.0 +27167,17269,0,@armnotstrong: Do you know what compiler was used? The structure of an std::string is going to vary wildly based upon that,1/25/2018 2:31,,266,CC BY-SA 3.0 +27168,14262,0,"Try running http://reveng.sourceforge.net/ against it playing around with the parameters + +If it is a normal crc (initial value of 0) then you can also check the identity `CRC(A)^CRC(B)=CRC(A^B)` and if it's true you can use it to validate and generate checksums",1/25/2018 2:36,,266,CC BY-SA 3.0 +27169,17269,0,@Avery3R all I know is that this was a project of [cocos2dx](http://www.cocos2d-x.org/) compiled for android device,1/25/2018 3:02,,23016,CC BY-SA 3.0 +27170,17269,0,@perror sorry for the inconvenience,1/25/2018 3:02,,23016,CC BY-SA 3.0 +27172,17281,0,Updated the question. It'd be really great if you could expand and talk specifically about the sdb files radare ships with (now in the question).,1/25/2018 8:46,,22669,CC BY-SA 3.0 +27173,17284,1,"FYI `PUSH {R0-R2}` saves R0, R1 and R2.",1/25/2018 8:53,,60,CC BY-SA 3.0 +27174,17286,0,Can you share the binary so that we can help you better?,1/25/2018 10:03,,14622,CC BY-SA 3.0 +27175,17281,1,"Sure, updated with the relevant information",1/25/2018 10:08,,18698,CC BY-SA 3.0 +27176,17273,0,"Thanks, thats exactly what I needed! I did it with OllyDbg, but had to change from arguments ""guessing"" to expressions because otherwise it wouldn't guess _thiscall and value of ECX. + + +Unfortunately x64dbg gives me BREAKPOINT_EXCEPTION after too many calls then I can't even resume with exception swallowing/ignoring option. Any idea why it happens?",1/25/2018 10:16,,23021,CC BY-SA 3.0 +27177,17286,0,"@sudhackar sure, the `.so` file could be found [here](https://www.dropbox.com/s/fpy6kamr43saq42/libcocos2dcpp.so) and you can search for `EncodeUtil.getDecryptStr` to find the function",1/25/2018 10:54,,23016,CC BY-SA 3.0 +27182,17284,0,"Ah yeah, I meant saved in another register to be used within this function later, like it did with `MOV R7, R0`. `R1` and `R2` are definitely used somewhere in this function later, but I'm willing to bet they're assigned to first before they're read from.",1/25/2018 20:37,,266,CC BY-SA 3.0 +27185,17295,1,"You could try playing around with the file's header to make it a dynamic library, load it into your program, then call the function with a function pointer.",1/25/2018 20:47,,266,CC BY-SA 3.0 +27187,17296,0,"Well, what I'm wondering is if there is something like a hotkey that brings up the ability for me to edit registers and then sets rip to the function and runs it until it returns. Or some kind of functionality like that? This must come up often and I'm new, how do people that do this for a living execute single functions in executables or shared objects?",1/25/2018 22:29,,22669,CC BY-SA 3.0 +27188,17273,0,It’s probably happening because of a race condition. A similar bug is present in all debuggers but it’s very possible you will never see it again :),1/25/2018 23:25,,2221,CC BY-SA 3.0 +27190,17298,0,no pdb contains full debug information including but not limited to source line info and if you have a private pdb those have type info too to leversge the power if odb you may need to use windbg,1/26/2018 7:54,,3473,CC BY-SA 3.0 +27191,17296,1,use dynamic instrumentstion like intels pin etc or use emulato4s like unicorn etc,1/26/2018 7:58,,3473,CC BY-SA 3.0 +27193,17281,0,There's also Shim Database: https://msdn.microsoft.com/en-us/library/bb432182%28v=vs.85%29.aspx which is also .sdb file,1/26/2018 9:33,,22324,CC BY-SA 3.0 +27194,17257,0,"I tried to generate the signature file but it found about 7000 functions all colliding together, so a quite useless signature",1/26/2018 13:20,,21036,CC BY-SA 3.0 +27195,17257,0,yep there are a lot of small functions which you won't be able to detect by signatures,1/26/2018 13:31,,22324,CC BY-SA 3.0 +27197,17303,0,"when you say referenced by ordinal instead of by name? does the pdb not also have the ordinal information for the symbol? Also, while you you certainly say how pdbs are more helpful it isn't clear to me coming into this how it's more helpful. How can I see the information added by the pdb in `Name and type information for local variables and data structures` It seems I have the same information before and after? I'd like to be able to see what the pdb added that radare didn't already know with the sdb.",1/26/2018 17:19,,22669,CC BY-SA 3.0 +27200,17273,0,"@mrexodia unfortunately it happened multiple times in row, had to restart the app and x96dbg because it wouldn't let me resume otherwise. There was like 15000 calls of this function in less than minute in OllyDbg log file.",1/27/2018 17:15,,23021,CC BY-SA 3.0 +27201,16233,0,"The old PPC ELF spec (http://refspecs.linuxbase.org/elf/elfspec_ppc.pdf) defines r31 as 'Used for local variables or ""environment pointers""', so maybe this is what you are seeing in this code. So it might help to specify which platform the code you are analyzing is supposed to run on.",1/27/2018 18:53,user22967,,CC BY-SA 3.0 +27202,16233,0,"@MichaelEngel Not OP, but I'm also seeing this in the `main()` function of an executable that was compiled using CodeWarrior. It does the same thing as OP's function: the SP is copied to r31, and r31 is used as the SP in the rest of the function.",1/27/2018 19:24,,18521,CC BY-SA 3.0 +27206,17304,0,"Given that the upper 4-bits are always 0b100 in the last byte you list, I would imagine the checksum/fcs is only the last 4 bits",1/28/2018 4:50,,14715,CC BY-SA 3.0 +27214,17320,0,"This is a pretty broad question, for what purpose do you need to determine if a binary is composed of mostly 32-bit code? composed of 32-bit code compared to what, 64-bit code? data? Voting to close as this question is too vague",1/29/2018 2:35,,2147,CC BY-SA 3.0 +27219,17320,0,"Check the opcodes, and see if if they correspond to x86 or x64 instructions?",1/29/2018 11:20,,2354,CC BY-SA 3.0 +27224,17320,0,The purpose was to determine if the code was primarily 32-bit code versus say python scripts. I was able to use some of the tools available to determine the composition.,1/29/2018 16:15,,22947,CC BY-SA 3.0 +27226,17286,0,Have you tried just xoring it with the byte array that you have commented? If that doesn't work I'd try stepping through it with a debugger.,1/29/2018 19:16,,266,CC BY-SA 3.0 +27228,17286,0,"it would be best if you would have some examples to run them through, but it looks like xoring would do what can be also noted from what does the encryptStr does.",1/29/2018 20:08,,18014,CC BY-SA 3.0 +27229,17327,2,you need to ask specific questions rather than for general advice.,1/29/2018 20:33,,60,CC BY-SA 3.0 +27230,17257,0,"Is there a possibility to ""mark"" these small functions to at least know they belong to a library instead as being user code?",1/29/2018 21:09,,21036,CC BY-SA 3.0 +27232,17262,1,this showed up in my twitter feed today: https://github.com/attify/firmware-analysis-toolkit,1/29/2018 22:33,,18317,CC BY-SA 3.0 +27233,17286,0,"@PawełŁukasik @Avery3R I think you can use `%EB%9Ff%C5%A4q%D0%D9%88%F2M%87%C9Z%92%A6%83%BC%3B%86%8B%2D%8B%EC` this string(which is encoded first using httpUrlEncode according to the code) to do the test, moreover, I upload the SQLite DB which contains the encrypted string [here](https://www.dropbox.com/s/h1o8dyunmzthr29/crazytalk.sqlite?dl=0)",1/30/2018 2:37,,23016,CC BY-SA 3.0 +27234,17331,1,"Hi, @Nirlzr thanks for your answer, seems promise, I will dig into that",1/30/2018 3:03,,23016,CC BY-SA 3.0 +27235,17331,0,"Hi, @Nirlzr check the edit :-( could you give some pseudocode, so I can try to understand that?",1/30/2018 3:38,,23016,CC BY-SA 3.0 +27236,17331,0,"@armnotstrong You're doing the xor (although, again, the code there is not merely a xor. there some peculiarities with calling `sub_3B25D0` multiple times etc) but not performing the decompression.",1/30/2018 3:39,,2147,CC BY-SA 3.0 +27237,15116,0,@Lawrence : Please do share your research :),1/30/2018 5:41,,3868,CC BY-SA 3.0 +27238,15116,1,@SYS_V : +1 for fantastic explanation.,1/30/2018 5:42,,3868,CC BY-SA 3.0 +27239,17257,0,"I'm not sure, maybe there's some way. I haven't tried to do so. Maybe there's something in FLAIR documentation.",1/30/2018 8:23,,22324,CC BY-SA 3.0 +27240,17286,0,Should it be valid text in Chinese by any chance ? Something like this 爸爸的哥哥叫大伯 ?,1/30/2018 12:39,,2318,CC BY-SA 3.0 +27241,17286,0,"yes!!! @ws that's right, what's the algorithm and how did you find it?",1/30/2018 13:06,,23016,CC BY-SA 3.0 +27243,17286,0,See the new answer.,1/30/2018 13:36,,2318,CC BY-SA 3.0 +27244,17336,0,"Thanks, I will figure out what the problem is with my java code :D",1/30/2018 13:38,,23016,CC BY-SA 3.0 +27245,17334,0,use r2pipe? but what output do you expect to get?,1/30/2018 13:51,,18014,CC BY-SA 3.0 +27246,17336,1,"interesting content (via google translate): ""爸爸的哥哥叫大伯""->""Dad's brother called uncle"" ;)",1/30/2018 13:56,,18014,CC BY-SA 3.0 +27247,17333,0,https://github.com/Yara-Rules/rules,1/30/2018 13:56,,18317,CC BY-SA 3.0 +27248,17334,0,I want disassembled opcodes of binaries. How can I use r2pipe?,1/30/2018 14:07,,21812,CC BY-SA 3.0 +27249,17334,0,that you can do w/o r2pipe `r2 -c 'pd' -q /bin/ls` or with the address specified `r2 -c 'pd @ 0x1000012ec' -q /bin/ls`,1/30/2018 14:18,,18014,CC BY-SA 3.0 +27250,17336,0,@PawełŁukasik LOL,1/30/2018 14:29,,23016,CC BY-SA 3.0 +27252,17334,0,"Thank you a lot. But I still have a problem, this command does not disassemble the whole file. How can I dis-assemble the whole file?",1/30/2018 15:27,,21812,CC BY-SA 3.0 +27254,17334,1,'pd N' and you can specify as N whatever number you want and it will disassemble N instructions,1/30/2018 15:47,,18014,CC BY-SA 3.0 +27255,17334,1,"I suggest you to read the [radare2 book](https://radare.gitbooks.io/radare2book/content/), it will teach you the basics.",1/30/2018 17:09,,18698,CC BY-SA 3.0 +27258,17334,1,"Are you sure you want to disassemble ""the whole file""?",1/30/2018 19:02,,2959,CC BY-SA 3.0 +27259,17326,0,"Not sure what you're asking but AL is part of EAX. `EAX` is the full 32-bit value, `AL` is the lower 8 bits whereas `AH` is the higher 8 bits",1/30/2018 19:52,,18698,CC BY-SA 3.0 +27260,17327,0,"technically speaking all answers are ""general advice"", my question was pretty specific. this is a reverse engineering forum. I am asking for additional sources of info, like from a feed someone saw earlier or maybe a sentence or two about what they do. nothing crazy man.",1/30/2018 22:16,,22947,CC BY-SA 3.0 +27262,17347,0,"You're welcome - and yes, I think it's a shame so many people don't really get to use a compiler from the command line at all nowadays, since so much development takes place in complex IDEs like Eclipse. But this might just be an old Unix greybeard ranting :).",1/31/2018 1:10,user22967,,CC BY-SA 3.0 +27263,17347,0,"Still not working, I get the same error. Did it work for you?",1/31/2018 1:10,,22669,CC BY-SA 3.0 +27264,17347,0,"With `-c` I do not get `/tmp/ccr2dk4u.o: In function _start': +app.c:(.text+0xa): undefined reference to foo' +collect2: error: ld returned 1 exit status`. However, I still get `app.c: In function ‘_start’: +app.c:3:3: warning: implicit declaration of function ‘foo’ [-Wimplicit-function-declaration]`, and with `-c` I still don't have a `.o`",1/31/2018 1:11,,22669,CC BY-SA 3.0 +27265,17347,1,"Do you get the actual error message (undefined reference) or just the compiler warning? The warning simply results from neglecting to provide a prototype for foo(); - adding ""void foo(void);"" at the start of the file should get rid of the warning.",1/31/2018 1:12,user22967,,CC BY-SA 3.0 +27268,17326,0,"Yes, but my question is how IDA knows to recognize that `EAX`, `AH`, `AL` are part of the same register, and if there's a IDA Python function that could tell me that? As you can see in the picture, choosing `EAX` make `AL` be highlighted too, meaning that there's some king of way that IDA connects between them behind the scenes.",1/31/2018 8:11,,31278,CC BY-SA 3.0 +27269,17346,3,https://english.stackexchange.com/search?q=addend,1/31/2018 10:36,,18014,CC BY-SA 3.0 +27270,17334,0,@PawełŁukasik how can I determine the N for the whole opcodes?,1/31/2018 12:27,,21812,CC BY-SA 3.0 +27271,17334,0,"I would just use some big number, but I agree with @usr2564301 with the question if you really want to disassemble the whole file.",1/31/2018 12:35,,18014,CC BY-SA 3.0 +27272,17334,0,"I need the whole opcode, so I think It's necessary to disassemble the whole file. Am I right?",1/31/2018 13:03,,21812,CC BY-SA 3.0 +27273,17350,0,"Thanks. I also faced the problem with replacing string of an existing language (e.g. Mexican) to German is not possible, cause the new string would be longer. So in other words there is no solution for my plan, right?",1/31/2018 16:28,,23102,CC BY-SA 3.0 +27274,17304,0,@cimarron: i was check XOR of last 4 bit from byte 4 to byte 12. But still calculate CRC byte.,2/1/2018 3:13,,23054,CC BY-SA 3.0 +27275,17350,0,"I think the only more or less feasible solution is to use some sort of abbreviations or anglicisms and replace an existing language. I think it's possible to rebuild the binary with changed string lengths (and offsets), but I'm not sure how complex this task can be. I would start by disassembling the binary and writing a linker script to assemble it back from section data. Since it's not encrypted or otherwise protected there's a chance it will work.",2/1/2018 5:23,,13606,CC BY-SA 3.0 +27277,17346,2,"Addend+addend, minuend-subtrahend, multiplicand*multiplier, dividend/divisor",2/2/2018 8:25,,4731,CC BY-SA 3.0 +27278,17356,1,"I doubt there's an easy solution. If it's using system API calls to validate the certificate you might be able to intercept that and return true. If not, you're going to have to dig into the application enough to either find and replace its pinned cert or knock out the code that does cert validation, and work around any anti-tamper code that may be in place. Either that or discover the pinned cert's private key, but that's infeasible.",2/2/2018 10:09,,13139,CC BY-SA 3.0 +27284,11736,1,"Whilst this may theoretically answer the question, [it would be preferable](//meta.stackoverflow.com/q/8259) to include the essential parts of the answer here, and provide the link for reference.",2/3/2018 12:15,,13506,CC BY-SA 3.0 +27288,17382,0,"Thanks a ton, I wonder why `_start` wasn't imported into the current flagspace, or how would I go about importing all symbols? Or specific symbols?",2/4/2018 5:45,,22669,CC BY-SA 3.0 +27292,17387,2,Maybe add a bit more on how to use it in this case.,2/4/2018 20:18,,18014,CC BY-SA 3.0 +27293,17386,1,it might be hard to analyse the whole file w/o the binary that reads them,2/4/2018 20:20,,18014,CC BY-SA 3.0 +27294,17377,0,"Hi thanks. I've seen your code already, I'm looking to load a static binary into a process which is already mapped to 0x40000, will it remap the code for whether it gets malloced?",2/4/2018 20:43,,23152,CC BY-SA 3.0 +27295,17386,1,There is *nothing* in that file that suggests it's compressed in any way. It seems to be just a database.,2/5/2018 0:13,,2959,CC BY-SA 3.0 +27297,17377,0,"You should mention that you already see the code in your question, and it's not my code.",2/5/2018 3:30,,22363,CC BY-SA 3.0 +27298,17363,0,"Currently on 6.95, because some important plugins aren't updated yet.",2/5/2018 5:13,,17675,CC BY-SA 3.0 +27301,8724,0,"Did you try to set a breakpoint in the GOT section ? For example, on `_libc_start_main()`.",2/5/2018 14:35,,53,CC BY-SA 3.0 +27302,17392,1,Heh nice trick. Love it,2/5/2018 15:58,,22669,CC BY-SA 3.0 +27303,17373,0,"Yes, I saw it. But I do not understand what should be pass as a second argument, and thats why I got errors when tried to run this script on my exe.",2/5/2018 16:51,,18298,CC BY-SA 3.0 +27304,17394,1,have you checked this? https://bitbucket.org/argussecurity/psida,2/5/2018 17:05,,18014,CC BY-SA 3.0 +27307,17373,0,That example script allows to start execution from choosen address. For start I would use what's stored and presented as entrypoint.,2/5/2018 19:37,,8133,CC BY-SA 3.0 +27309,17396,6,"That is typical for per-character compression such as LZMA (if I remember my abbreviations correct). It was a natural next step up from basic RLE (where a leading value or one or more bits indicate what to repeat). The next step was to compress *bits*, and in such a case you would not be able to find plain text anymore.",2/5/2018 23:33,,2959,CC BY-SA 3.0 +27311,2466,1,I don't think this is is true. I think the non-EAX take more cycles (3 and not 1) and I think all the XCHG versions actually 0 the higher order 32 bits on a x86_64. https://stackoverflow.com/a/25053039/124486,2/6/2018 1:41,,22669,CC BY-SA 3.0 +27316,17398,1,"When you're working in a project with people from different ""geographic workplaces"", most of these collaborative plugins simply don't work because they require you to be connected in the same network. Yeah, you can use it with a VPN but... no. Also, such tools, IMHO, create more problems than talking and sharing scripts/databases between reversers. Why? Let's say that 2 reversers worked in the same subset of functions. Which comments and names are correct? Which ones aren't?",2/6/2018 9:18,,111,CC BY-SA 3.0 +27318,17396,1,Thanks for pointing me in the right direction! It seems to be LZSS actually. I managed do decompress one part of the file apparently correct. But some other parts with the same compression don't decompress correctly. I think I haven't figured out the exact parameters or it could be some LZSS variant...,2/6/2018 17:20,,23171,CC BY-SA 3.0 +27319,17396,1,"Perhaps you could show your current code in your question. It may help if you put in a link to the data as well, so others don't have to re-type it from your screenshot.",2/6/2018 17:45,,2959,CC BY-SA 3.0 +27320,17396,0,"Yes, good point, here it is!",2/6/2018 18:40,,23171,CC BY-SA 3.0 +27324,8724,0,"""position-independent, statically-linked"" -- There is no GOT.",2/6/2018 20:05,,264,CC BY-SA 3.0 +27325,8724,0,My bad... I read too quickly. Sorry.,2/6/2018 20:23,,53,CC BY-SA 3.0 +27326,17396,0,"Can't actually download the 1st sample part in your post, the link isn't set to public.",2/7/2018 6:47,,12091,CC BY-SA 3.0 +27328,17396,0,"Wow, I reversed almost this exact algorithm implemented in 65x a while back, didn't know it had a name. You learn something new every day. Maybe I'll try it out on these mysterious KLIB files I've got if it's a standard thing.",2/7/2018 8:56,,13831,CC BY-SA 3.0 +27331,17396,0,"@TkTech Oops, now it should work! Thanks for pointing out!",2/8/2018 1:17,,23171,CC BY-SA 3.0 +27332,17396,0,"@sqykly I am glad it helps, it is relatively standard, there are a few parameters, shouldn't be very hard to figure them out, they said :D",2/8/2018 1:19,,23171,CC BY-SA 3.0 +27333,17410,0,"I don't know radare2, but it could be that one of those functions is main but you just don't have symbol names available? With MSVC tools you can find the entry point with `dumpbin /headers`, although that's actually some code supplied by the C runtime that initialises state and then calls main, not main itself.",2/8/2018 5:59,,13139,CC BY-SA 3.0 +27334,17416,0,"Thanks for the info, I didn't know about `ie` before, but when I attempt it on this binary it claims there are 0 entrypoints - how is that even possible?",2/8/2018 7:13,,23218,CC BY-SA 3.0 +27335,17416,0,"What is the output of `r2 -v`? Also, you get 0 entrypoints even with `rabin2 -e program_name`?",2/8/2018 7:21,,18698,CC BY-SA 3.0 +27336,17411,0,The first thing I'd start from is searching for datasheet. Did you check the large white plastic header with 4 pins for being serial port ?,2/8/2018 7:25,,2318,CC BY-SA 3.0 +27337,17417,1,Brilliant senor !!,2/8/2018 7:59,,23222,CC BY-SA 3.0 +27338,17417,0,"how would i achieve this if ""Hello world"" was stored in a variable named *name in C ?",2/8/2018 8:36,,23222,CC BY-SA 3.0 +27339,17417,0,Just the same. The string is stored in the data section and referenced by the code.,2/8/2018 8:44,,18698,CC BY-SA 3.0 +27340,17417,0,"If you could show the code,it would be very helpful !",2/8/2018 9:08,,23222,CC BY-SA 3.0 +27341,17417,0,Sure. Check out this [paste](https://pastebin.com/3ADmWez2).,2/8/2018 9:17,,18698,CC BY-SA 3.0 +27342,17416,0,"Output of `r2 -v` is `radare2 2.2.0 1 @ windows-x86-32 git.2.2.0 +commit: db3d717c39b8ab6b317d229d2a8539dff11918f2 build: Sun 12/24/2017__18:05:13.43` and `rabin2 -e bin.exe` yields 1 entrypoint for some reason: `vaddr=0x00404161 paddr=0x00004161 baddr=0x00400000 laddr=0x00000000 haddr=0x00000118 type=program`.",2/8/2018 9:24,,23218,CC BY-SA 3.0 +27343,17416,0,"So here's your entrypoint. Try open the program with `r2` not in debug mode (`r2 program`). Then, `ie` should show you this entrypoint. You can also check for the flag ""entry0"" which flags the entrypoint (`f~entry). To open in debug mode from within radare2 shell you can use `ood`. Moreover, in debug mode, radare2 automatically stops at the entrypoint of the program.",2/8/2018 9:29,,18698,CC BY-SA 3.0 +27347,17416,0,"Due to limitations of comment formatting, I have edited my original question with the new output. At this point, I suspect it is some deeply-rooted compatability issue with either radare2, MinGW, or something else entirely.",2/8/2018 10:09,,23218,CC BY-SA 3.0 +27348,17416,0,and what is the result of `ie` after executing `ood`? in debug mode without analysis.,2/8/2018 10:19,,18698,CC BY-SA 3.0 +27349,17416,0,Back to 0 entrypoints as before.,2/8/2018 10:28,,23218,CC BY-SA 3.0 +27350,17416,0,Let us [continue this discussion in chat](http://chat.stackexchange.com/rooms/72867/discussion-between-megabeets-and-jmcph4).,2/8/2018 11:38,,18698,CC BY-SA 3.0 +27351,17419,0,"What is the specific firmware image you are looking at? Please provide the name, location in the FTP server, and md5sum",2/8/2018 15:42,,18317,CC BY-SA 3.0 +27353,17411,0,"I was advised to look into the 25L6436F chip and use flashrom, I will be using a soic clip 8 w/ a raspberry pi. now I just have to wait for that to arrive from china. however I need to find a tutorial that properly explains how to determine if pins/pads are actual serial connectors, either using a multimeter or logic analyzer.",2/8/2018 16:03,,23219,CC BY-SA 3.0 +27354,17398,0,@joxeankoret I concur :),2/9/2018 6:46,,1358,CC BY-SA 3.0 +27366,17403,0,"I edited the question, hopefully this is what you actually wanted to ask; if not, please clarify in a comment or edit it yourself.",2/9/2018 16:19,,60,CC BY-SA 3.0 +27367,11439,0,If you are getting socket error make sure firewall doesn't block the connection and/or port is not already used. In my case I got an error and had to disable COMODO firewall entirely,2/9/2018 18:57,,15329,CC BY-SA 3.0 +27369,17419,0,"Hi, I edited my original question. +However I'm not allowed to post more than 8 links. + +This company releases many firmware for every adapter that they produce. These firmware can be decrypted and/or encrypted. +For instance, this file: ftp://219.84.35.58/brookhex/P2_X1/ZPK0J020_V16_20161206_AP-3378_auth.hex and this file ftp://219.84.35.58/brookhex/P2_X1/ZPK0J020_V16_20161206_AP-D7D1.hex are the same but one is encrypted and the other one not. +My goal is to understand the encryption algorithm that they use.",2/9/2018 19:09,,23209,CC BY-SA 3.0 +27370,17419,0,"Thank you for making those changes. You are providing quite a bit of information - which is good - but not all of it is strictly relevant to the main difficulty you are facing, which is decrypting file `ZP0***_auth.hex`. It would be great if you could focus as much as you can on details surrounding this particular file - the exact device, board, processor, and everything you know about this particular file specifically. The question would be more clear if one part focused just on the encrypted file and the another part provided the additional related information.",2/9/2018 19:22,,18317,CC BY-SA 3.0 +27371,17419,0,"Hi, thanks for you interest. +in my opinion, they use the same uC for every product that, as I said, it should a Nuvoton M452RG6AE/M452RE6A (ARM-Cortex M4 - V7M). +Since I was not able to decrypt the firmware that I'm interested, I focused my attention on the files that are not encrypted and also on the software update, to try to discover something. +But so far, no luck :-(",2/9/2018 19:33,,23209,CC BY-SA 3.0 +27372,17419,0,I think I understand. Have you identified the bootloader for the device?,2/9/2018 19:41,,18317,CC BY-SA 3.0 +27373,17419,0,"No, unfortunately I was not able to identify the bootloader. Some parts are decompiled by IDA as data or ""unk"" and when are converted to code, they don't look to be a bootloader code.",2/9/2018 19:49,,23209,CC BY-SA 3.0 +27374,17419,0,You either need to identify the bootloader and reverse it to see how the firmware is decrypted or gain physical access to the device and dump the firmware from memory,2/9/2018 20:01,,18317,CC BY-SA 3.0 +27376,17419,0,"I don't have the physical device and I'm tempted to buy one. But, by looking at the circuit board (the link is in my original question), it seems that they are too smart for having left the jtag enabled. As far as I know there aren't other (easy) ways to dump the firmware from this ARM.",2/9/2018 20:20,,23209,CC BY-SA 3.0 +27377,17426,3,Possible duplicate of [How can I analyze a potentially harmful binary safely?](https://reverseengineering.stackexchange.com/questions/23/how-can-i-analyze-a-potentially-harmful-binary-safely),2/10/2018 13:50,,18317,CC BY-SA 3.0 +27378,17428,0,"Not much info about `IMAGE_DEBUG_TYPE_VC_FEATURE`, indeed. I will post a new question at stackoverflow, maybe somebody knows more about `IMAGE_DEBUG_TYPE_VC_FEATURE`.",2/10/2018 16:47,,11830,CC BY-SA 3.0 +27379,17429,0,can you add a sample snippet to the question? Use the edit link below it.,2/10/2018 17:51,,60,CC BY-SA 3.0 +27381,17434,0,"Thanks, maybe it's better to buy a new hard driver.. but the samples have been deleted the extension name, so I am wondering if they can still excute..",2/11/2018 8:08,,23250,CC BY-SA 3.0 +27386,17426,0,"In the past this was impossible, but then Windows, among other OSes, might hide the extension, so you think it's not there while it is :) So if you're sure the extension is not hidden then nope. Then again, I haven't touched Windows for years, this guy says the opposite https://superuser.com/a/690608",2/12/2018 0:12,,1358,CC BY-SA 3.0 +27387,17436,0,The simplest will be to try othert filesystem types - don't take what a tool tells you as a holy writ. Then you could actually look at the file itself in a hex editor and see which filesystem it conforms to.,2/12/2018 0:17,,1358,CC BY-SA 3.0 +27391,17437,1,"Thanks for your long reply. I understand that is complicated to do this project, but it’s very very important to me to do that. So I edited my question with more details about the project, and I hope you can help me with that.",2/12/2018 9:24,,22666,CC BY-SA 3.0 +27393,17337,0,@Nobert: aware malware use the same method. This prof of concept. On the Windows 10 (64bit OS ) -my original 32 bit program has run time error though it compiled successfully. Will try your new code and update here. Thanks for your efforts..Cheers!,2/12/2018 10:42,,22797,CC BY-SA 3.0 +27394,17337,0,"@Chandra No problem, happy to help!",2/12/2018 10:43,,23096,CC BY-SA 3.0 +27395,17426,0,"Thx, Vitaly. The samples need to add the extension name and I didn't run the cmd script. xD @VitalyOsipov",2/12/2018 11:54,,23250,CC BY-SA 3.0 +27396,17444,0,"it is a client of an old game where I have already found some info about the extension but no more since it is a proprietary format to the game engine. + +I'm going to keep digging around a little longer.",2/12/2018 15:47,,23267,CC BY-SA 3.0 +27397,17435,0,"Yes, you understood me right. I searched for something like `xref` in IDA.",2/12/2018 18:15,,18080,CC BY-SA 3.0 +27398,17451,0,"1)why Decompilation and recompilation is lossy2) if I want to edit directly the bytecode, how can I check if I done it well ? wach it on JD-GUI? 3) by the way, if I edit 1 function from big class via bytecode, but edit only the internal logic of this functon, is that influence on another functon? thank you!",2/13/2018 4:57,,23279,CC BY-SA 3.0 +27403,17456,0,"It doesn't write to the terminal, so where is the log file ?",2/13/2018 11:56,,22071,CC BY-SA 3.0 +27404,17455,0,+1 trying frida-trace,2/13/2018 12:08,,22071,CC BY-SA 3.0 +27405,17456,0,"It writes to the terminal, I verified it in my home computer with Wine 1.6.2 in Ubuntu 16.",2/13/2018 12:12,,111,CC BY-SA 3.0 +27406,17456,0,"I'm using same OS and wine 2.4 and it doesn't, I will try again",2/13/2018 12:14,,22071,CC BY-SA 3.0 +27407,17455,0,"$ sudo frida-trace *wine* ""Failed to attach: ambiguous name; it matches: wineserver (pid: 1), C:\windows\system32\winedevice.exe (pid: 2), C:\windows\system32\winedevice.exe (pid: 3)"" which one ? (tried all, does not seems to work, might have anti-reversing? I'll test with your example)",2/13/2018 12:22,,22071,CC BY-SA 3.0 +27408,17455,0,i dont run nix and wine but shouldn't you be running frida inside wine and not frida from nix i mean os->wine->frida->your_exe->args ? not os->frida->wine->your_exe ??,2/13/2018 13:09,,3473,CC BY-SA 3.0 +27410,17455,0,Frida-trace can connect to process by pid,2/13/2018 13:47,,22071,CC BY-SA 3.0 +27412,17455,0,of course it can and my point is not that i meant shouldn't you need to install frida first inside wine (the windows version of frida ) and from that frida shouldn't you trace the executable in question well i think i should dust off my ubu vm and see,2/13/2018 14:25,,3473,CC BY-SA 3.0 +27413,17451,0,"If you only edit the bytecode of one method, that won't affect any other methods. As for how to check your results, you could just disassemble it again.",2/13/2018 15:07,,1739,CC BY-SA 3.0 +27414,17455,0,"$ frida-trace /usr/bin/wine bin.exe; ""stderr> Usage: wine PROGRAM [ARGUMENTS...] Run the specified program""..",2/13/2018 15:25,,22071,CC BY-SA 3.0 +27416,17451,0,"I tried to edit bytecode (.class file) with http://cs.ioc.ee/~ando/jbe/ .I have class file with some functions , I tried to edit 1 func that get some arguments and have some local var .When I put this class file on intellij I see the name of arguments and name of local var . but when I click on save on JBE , the name of all arguments and local var changed to var1,var2 . why? I want to edit byte code without delete anything",2/13/2018 16:15,,23279,CC BY-SA 3.0 +27417,17459,0,"If your current tools worked for 95%, chances are that that word is just not in your dictionary.",2/13/2018 18:32,,2959,CC BY-SA 3.0 +27418,17459,1,"I added every tool to the list I ever used, then i looked up the ClassName of each and hashed it using the Algorithm above. Finally I compared the hashes to the list of hashes i extracted from the malware. + +Therefore yes, this last tool it is not in the list - that's exactly the problem since I do not know any more RE tools for Windows.",2/13/2018 19:02,,23287,CC BY-SA 3.0 +27422,17464,0,"You can find a lot of material about using Z3 for reverse-engineering here: [Yurichev's Blog](https://yurichev.com/blog/). Quite interesting tool, indeed.",2/14/2018 8:41,,53,CC BY-SA 3.0 +27424,17464,2,"Vitaly, the problem is that Z3 might find whatever that creates that hash. I really doubt that the hash is cryptographically safe, thus, there will be a gazillion or more collisions.",2/14/2018 9:06,,111,CC BY-SA 3.0 +27425,17464,1,"thanks! but yes, i had around 3000 collisions per hash within the first 12 hours of brute-forcing. anyway, thank you for the hint!",2/14/2018 15:07,,23287,CC BY-SA 3.0 +27426,16769,0,IDA 6.0/6.1 is pretty-pretty old.,2/14/2018 16:07,,111,CC BY-SA 3.0 +27427,17451,0,"Most likely, the tool you used didn't preserve the metadata attributes. Have you tried using Krakatau? That will preserve everything by default.",2/14/2018 16:33,,1739,CC BY-SA 3.0 +27430,17470,2,"6 is a label/branchoffset. If the comparison shows that the two values are not equal, then execution jumps to the instruction at location 6 (in your example, that is). Good resources here (https://cs.au.dk/~mis/dOvs/jvmspec/ref--24.html) and here (https://en.wikipedia.org/wiki/Java_bytecode_instruction_listings).",2/14/2018 21:30,,20928,CC BY-SA 3.0 +27431,17451,0,"I don't understand how to use Krakatau , Is there any gui to use it on windows? I only want to edit bytecode, I dont want to re-compaile code and can you tell me pleaase how can I only edit byte code of 1 function from .class file that include few funcrion (I don't want touch another functions) without re-compaile it and saving on metadata? ot o you know another tool with gui for that ? thanks!",2/14/2018 21:32,,23279,CC BY-SA 3.0 +27432,17451,0,"@cdcsccd You disassemble the classfile into a textual `.j` file, edit that, and then reassemble it into a classfile. There's no compilation going on, only disassembly and reassembly, which are lossless in the case of Krakatau.",2/14/2018 22:20,,1739,CC BY-SA 3.0 +27433,16175,0,"Chromium doesn't include the Widevine Content Decryption Module. This module is closed source, and included with the main stream Google Chrome distribution. So, it's not quite that easy. [Better post describing stuff](https://unix.stackexchange.com/questions/172364/netflix-works-on-chrome-but-not-chromium#172366)",2/15/2018 0:48,,23302,CC BY-SA 3.0 +27434,17471,0,in this case 6 is that mean instruction no..6 from the beginning of my function? is that depend on my os or on somthing else? or 6 is always instruction no. 6?,2/15/2018 3:37,,23279,CC BY-SA 3.0 +27435,17470,0,@dsasmblr in this case 6 is that mean instruction no..6 from the beginning of my function? is that depend on my os or on somthing else? or 6 is always instruction no. 6?,2/15/2018 3:37,,23279,CC BY-SA 3.0 +27436,11630,3,When running using `-o run` instead of manually entering `run` in LLDB console it is not possible to interrupt the process using Ctrl-C. Is there any way to fix that?,2/15/2018 4:22,,23304,CC BY-SA 3.0 +27440,17471,0,"Instruction sizes are defined by the bytecode format and are OS independent. Most instructions are one byte long (hence the term bytecode), but some are longer. `if_acmpne` itself is 3 bytes for instance. Again, you really need to read the JVM spec.",2/15/2018 14:53,,1739,CC BY-SA 3.0 +27441,17451,0,"that you, Do you know another tool to edit bytecode but without lossless? I think that after I reassembly the j file there is some changes of lable numbers on another code",2/15/2018 17:04,,23279,CC BY-SA 3.0 +27443,17471,0,"I read the JVM spec, but when i open this class with Krakatau that show that the number that come after if_acmpne define lable name",2/15/2018 17:59,,23279,CC BY-SA 3.0 +27444,17451,0,"@cdcsccd If you pass `-roundtrip` to Krakatau, then nothing at all will change. If you don't, then only things which don't matter to execution, like the ordering of the constant pool will change.",2/15/2018 19:05,,1739,CC BY-SA 3.0 +27445,17471,0,"@cdcsccd That's the assembler being helpful. Working with the raw bytes directly is a huge pain, so assemblers define a human readable format which can be mapped to and from the underlying binary classfile. If you want to see the raw classfile, use a hex editor.",2/15/2018 19:07,,1739,CC BY-SA 3.0 +27446,17451,0,"1) roundtrip only help when Krakatau convert .class file to j file , but when I return j file to .class file there is no roundtrip so the ordering of const changed, 2) by the way do you recommend only on Krakatau to edit bytecode without loosless, or do you know another tool to do that?, thank!",2/15/2018 21:22,,23279,CC BY-SA 3.0 +27447,17451,0,"@cdcsccd If you use Krakatau to disassemble a classfile to a .j file and then reassemble the same .j file into a .class file, you'll get back the exact same classfile you started with. And yes I would recommend Krakatau. As far as I know, it is the only tool that is 100% lossless, but other tools should be good enough for most circumstances.",2/16/2018 0:28,,1739,CC BY-SA 3.0 +27450,17456,1,"+relay &> log, then grep",2/16/2018 16:15,,22071,CC BY-SA 3.0 +27452,17481,0,what is the data supposed to represent? Do you know the approximate values?,2/16/2018 21:42,,60,CC BY-SA 3.0 +27453,17484,0,"thanks for guiding me, now I will figure out the next steps.",2/16/2018 22:57,,23323,CC BY-SA 3.0 +27454,17481,0,"here to you some raw data with approximate data + + A=~-10 B=0 C=0 D=~-85.9 + E5 A7 CD 01 00 79 31 0A 79 35 0A 79 36 0A 40 0F 24 50 05 9B B1 94 00 23 00 23 00 23 00 23 00 22 00 22 00 22 00 21 + 8F E5 A7 CD 01 00 79 31 0A 79 35 0A 00 23 00 23 00 23 00 23 00 22 00 22 00 22 00 21 + 2B E5 A7 CD 01 00 79 31 0A 79 35 0A 79 36 0A 40 0F 24 50 05 9B",2/16/2018 22:59,,23321,CC BY-SA 3.0 +27455,17481,0,Ok probably it is better to edit the main question.,2/16/2018 23:04,,23321,CC BY-SA 3.0 +27456,17481,0,"yes, please do.",2/16/2018 23:07,,60,CC BY-SA 3.0 +27457,17481,0,I tried to do my best.,2/16/2018 23:14,,23321,CC BY-SA 3.0 +27458,17481,0,"Ok, I edited a third time adding a couple more of expected values.. Values are not exact.",2/16/2018 23:22,,23321,CC BY-SA 3.0 +27459,17481,0,thanks! hopefully with the new data it will be easier.,2/16/2018 23:23,,60,CC BY-SA 3.0 +27461,17483,3,"Can you please share a few more lines? While your first two instructions doesn't really make sense as a start of a shellcode , 77 90 (decimal) can be translated to 0x4d 0x5a (Hex) Which is the famous ""MZ"" (ASCII) header of a PE file.",2/17/2018 5:35,,18698,CC BY-SA 3.0 +27463,17486,0,Thanks for explaining. I'm wondering if there's a way to figure out the actual identity of these data members. Don't they get initialized in the object's constructor?,2/17/2018 12:15,,23329,CC BY-SA 3.0 +27464,6265,0,@RefaelAckermann link got 404ed,2/17/2018 14:15,,23332,CC BY-SA 3.0 +27465,6228,0,"i wish there were some DLL cals to expand those files, ratehr than to rely upon external; command-line tool",2/17/2018 14:27,,23332,CC BY-SA 3.0 +27466,6228,0,"https://msfn.org/board/topic/171184-microsoft-ipd-intra-package-delta-compression-tool/?do=findComment&comment=1070292 - this forum discusses (among others) the DLLs hat maybe implement IPD unpack. Quote1: ""Two years ago I had a hard time getting Expand too, so I pulled them from a laptop running Windows 7. The files you need are dpx.dll, expand.exe, expand.exe.mui and msdelta.dll.""",2/17/2018 14:31,,23332,CC BY-SA 3.0 +27467,6228,0,"Quote2: +My guess is that there (as usual/normal when MS is incolved) a misunderstanding or overlapping of names. + +IPD is a ""nice new name"" for a ""generic"" approach, ""Delta Compression"". + +There are two basic MS ""engines"" for it: + +http://msdn.microsoft.com/en-us/library/bb417345.aspx + +the good ol' PatchAPI (please read as ""mspatchc.dll"" for creation and ""mspatcha.dll"" for expansion) and the new MSDELTA (please read as ""msdelta.dll"").",2/17/2018 14:31,,23332,CC BY-SA 3.0 +27468,17486,0,"What do you mean identity? their name cannot be found unless it is included in the binary. most of that type of data (names, function args) is stripped away once you compile.",2/17/2018 17:56,,21707,CC BY-SA 3.0 +27469,17486,0,"Okay, but then I can at least assume that ""this+38"" is the same across all members of the class, can't I?",2/17/2018 18:05,,23329,CC BY-SA 3.0 +27470,17486,0,You can assume given that it's object of the same class. IDA has a structures tab where you can define structures and it'll make reversing a lot easier for you.,2/17/2018 18:06,,21707,CC BY-SA 3.0 +27472,17488,0,"Quite easy to understand. Thanks. But then, I don't have the opportunity to find the location of ""some_text"" without starting a debug session, do I?",2/18/2018 15:16,,23329,CC BY-SA 3.0 +27473,17419,0,"I'm still analyzing the encrypted and plain binary files (here the files: http://www101.zippyshare.com/v/71W0ofqq/file.html). The encrypted file is 276 bytes longer. I expect that in these bytes it should be a sort of header/footer that informs the bootloader and the encryption key! Reverse the algorithm is driving me crazy. I inverted and xor the bytes, but still no luck. In the encrypted file, also, there are few 0x00 and 0xFF bytes (I used this site: http://binvis.io to analyze it) and I don't see any ""magic number"". The algorithm should be easy to be fast and able to be stored in the LDROM",2/18/2018 15:24,,23209,CC BY-SA 3.0 +27474,6265,0,"https://web.archive.org/web/20150801180457/http://www.microsoft.com/en-us/download/details.aspx?id=1562 +The title was ""Using Binary Delta Compression (BDC) Technology to Update Windows Operating Systems"" +Seems like BDC was the precursor to RDC",2/18/2018 21:16,,11993,CC BY-SA 3.0 +27475,17491,0,what is the type of `dword_1F4A8A5C`? (press Y on it or hover mouse).,2/18/2018 21:35,,60,CC BY-SA 3.0 +27476,17490,1,"To the person who downvoted, I'd love to know why and learn from that. Thanks.",2/18/2018 21:47,,23344,CC BY-SA 3.0 +27477,17492,0,"Thanks for your answer! With QEMU, I can see that User-Mode Emulation would allow me to run that binary on PPC. However, is there software that actually ""translates"" the binary itself to run natively on PPC? Also, sorry I didn't state this in the answer, but McSema uses commercial software, which I can't use. Are there any alternatives to this? Thanks again!",2/18/2018 22:14,,23344,CC BY-SA 3.0 +27478,17491,0,@IgorSkochinsky It's an array of integers. The dll I'm reversing is 32-bit and the element it accesses is the address of the NPC/enemy.,2/18/2018 22:54,,23343,CC BY-SA 3.0 +27479,17493,0,And what did you try already? Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer.,2/19/2018 8:44,,18698,CC BY-SA 3.0 +27480,17493,1,"Try looking around on Github, there are [many](https://github.com/williballenthin/python-idb) projects related to automating IDA. Check out [this](https://github.com/nlitsme/pyidbutil) and [this](https://github.com/nccgroup/idahunt).",2/19/2018 9:01,,2354,CC BY-SA 3.0 +27482,17491,0,"It looks like that it is array of structures, where v3 is an index and 0xfff is used to avoid overfflow - I'd suggest that the array was originally defined with size 0x1000. The size of a structure should be 4 dwords.",2/19/2018 9:58,,2318,CC BY-SA 3.0 +27483,17493,0,"https://www.hex-rays.com/products/ida/support/idadoc/417.shtml - I'm not sure that it will work with free version, but there is a -B command line switch of full version + of IDA that automatically generates both .idb and .asm.",2/19/2018 10:35,,2318,CC BY-SA 3.0 +27485,17492,0,if you want to have completely independent native PPC binaries you'll have to go with option 2. Note that Rosetta worked like QEMU - it ran unmodified binaries via emulation.,2/19/2018 12:42,,60,CC BY-SA 3.0 +27486,17492,0,"Alright, thanks! Do you know any resources that would help me get that emulation setup? Again, I don’t want to install an operating system emulating PowerPC, but I want to run an emulated PowerPC program. I can’t find too many resources online for that.",2/19/2018 13:27,,23344,CC BY-SA 3.0 +27487,17497,0,"Is there a way to get the value without knowing rip if I know values for ImageBase, section offsets etc?",2/19/2018 14:06,,23350,CC BY-SA 3.0 +27488,17498,0,you are saying that writing and execution of IDAPython script is not possible until i buy a pro version?,2/19/2018 15:00,,23345,CC BY-SA 3.0 +27489,17497,0,You can calculate the offset from the base address to this address,2/19/2018 16:26,,18698,CC BY-SA 3.0 +27490,17497,0,So 0x180000000 - 0x1ee5b? That is 0x17ffe11a5. I’m not sure how I would get 0x11ce. Would you mind providing an example? I want to programmatically determine this via python so I have to act as though I don’t know the 0x1800011ce address and have to calculate it.,2/19/2018 17:17,,23350,CC BY-SA 3.0 +27491,17492,0,"wait, first you ask about emulating x86 on PPC and now the other way around? Ask on superuser.com or something, this does not seem related to RE.",2/19/2018 18:11,,60,CC BY-SA 3.0 +27492,17492,0,"Sorry was confused, was leaving for a flight; meant I don’t want an OS emulating x86, but instead emulating an x86 program on PPC",2/19/2018 20:48,,23344,CC BY-SA 3.0 +27493,17497,0,"That's another question. Please open a new question, describing thoroughly all the information you have and all that you tried.",2/20/2018 7:11,,18698,CC BY-SA 3.0 +27494,17491,0,"@ws Okay, after you explained it this makes more since. `v3 & 0xFFF` doesn't allow anything over 0x999. And I had the misconception that it was an array of pointers to structures. Not an actual array of structures. Thank you, you've helped tremendously. If you would like you can turn it into an answer and I'll accept it.",2/20/2018 15:36,,23343,CC BY-SA 3.0 +27495,17503,0,Are you working with an executable with debug information ?,2/20/2018 16:55,,2318,CC BY-SA 3.0 +27496,17503,0,@ws yes but the debug information is limited and in a weird format so I had to write a script to extract the info.,2/20/2018 17:15,,15658,CC BY-SA 3.0 +27497,17504,0,"in general, it is good to provide additional information about the context an instruction is found in, not just the instruction itself.",2/20/2018 19:03,,18317,CC BY-SA 3.0 +27498,17507,0,"Yeah im still pretty new to this and understand basic assembly, this particular instruction was early on in a function i am reversing so i don't know what rcx and rax is.",2/20/2018 19:18,,23364,CC BY-SA 3.0 +27499,17507,0,so another way of writing this could be [rcx + rax * 4 + 0x4A40FC] ?,2/20/2018 19:24,,23364,CC BY-SA 3.0 +27500,17507,0,"No, that index is at that specific point. With the code you provided you would be at that index, not `[rcx+rax*4]` . And no problem!! I'm happy to see you learning :-)",2/20/2018 19:27,,22194,CC BY-SA 3.0 +27501,17507,0,"Also, I suggest marking this answer as the accepted answer as it solved your problem (hopefully)",2/20/2018 19:28,,22194,CC BY-SA 3.0 +27504,17511,0,where is the cursor on screenshot 2?,2/21/2018 8:46,,60,CC BY-SA 3.0 +27507,17492,0,"`qemu-user` should allow you to do that. In any case, it's not really an RE issue. If you need help getting it work, try SuperUser.",2/21/2018 10:07,,60,CC BY-SA 3.0 +27509,17501,0,I think the first possibility is to check the datasheet (if available) of the chip you want to access and try to trace the pins from there,2/21/2018 15:55,,12251,CC BY-SA 3.0 +27510,17249,1,"Not an answer to your question, but I've found [Diaphora](https://github.com/joxeankoret/diaphora) to be quite useful and more powerful for recognising functions. You will still have to build Qt using the same toolchain to have more accurate matches though.",2/21/2018 17:07,,18521,CC BY-SA 3.0 +27512,17511,0,"@IgorSkochinsky mov dword ptr [eax], 776.... However, I tried on ALL lines using this struct and same thing.",2/22/2018 2:31,,18507,CC BY-SA 3.0 +27515,8023,0,maybe it would be simpler to find out how/where the pinned cert is stored and override that so fiddler could be used?,2/22/2018 14:44,,23385,CC BY-SA 3.0 +27516,17518,0,Very cool! Thanks a ton. I was thinking it'd be mentioned in `p?` I have a lot to learn.,2/22/2018 19:29,,22669,CC BY-SA 3.0 +27521,17519,0,this is a nice one!,2/22/2018 20:45,,18014,CC BY-SA 3.0 +27522,17517,0,"You may also want to try the `VVV` command, this is much nicer to look at.",2/22/2018 23:13,,53,CC BY-SA 3.0 +27523,17517,0,@perror I use that all the time `V` (and then I hit space). What's the difference between `VV` and `VVV`? Where is `VV` documented?,2/22/2018 23:25,,22669,CC BY-SA 3.0 +27524,17517,1,"Well, I do not know the difference between `VV` and `VVV`, in fact this is a quite good question. :-)",2/22/2018 23:28,,53,CC BY-SA 3.0 +27525,17517,0,@perror I don't think `VVV` exists. The top shows `[0x00400646]> VV @ main` as it does with `VVVV`,2/22/2018 23:30,,22669,CC BY-SA 3.0 +27526,17517,2,"Ah, so I did type an extra `V` for nothing for ages!",2/22/2018 23:30,,53,CC BY-SA 3.0 +27527,17517,0,"@perror no if you type the third V inside the first VV you get the graph of xrefs :) try s entry0 VV then V you will see the init() , fini() and main() nodes",2/23/2018 5:06,,3473,CC BY-SA 3.0 +27529,17464,1,"@joxeankoret I do not see a problem in collisions - find your gazillion and filter out the only (hopefully) valid one via some simple tool that checks for valid names. Extremely easy in Windows with blah.exe/dll/… name structure, and in Unices just look for alphanumeric space. This is a basic approach in ""cryptanalysis"". OP if you already have your collisions, then you're already half done, not need for Z3.",2/23/2018 8:15,,1358,CC BY-SA 3.0 +27531,17527,1,"the `echo`s seem to be just random noise, possibly to reduce detection rate. The meat is probably in the `iqgux rez.dcah` binary.",2/23/2018 13:49,,60,CC BY-SA 3.0 +27534,17527,0,"other than a hex editor, there away to look inside the binary?",2/24/2018 0:49,,23391,CC BY-SA 3.0 +27535,17529,1,"That fragment of a tree is not enough for me. Can you post the entire function? (Unless it's too long, then only post the from/to part.)",2/24/2018 5:03,,2959,CC BY-SA 3.0 +27536,17529,0,I have included an image of the entire function with the dialogue showing all of the to/from. I'm not sure how this will help with where those two isolated JMP instructions are being called from.,2/24/2018 5:39,,13934,CC BY-SA 3.0 +27537,17529,0,was this program patched before you disassembled it? Or are you patching it currently?,2/24/2018 6:12,,22194,CC BY-SA 3.0 +27538,17529,0,the only conclusion I can come up with is the program is patched or was patched.,2/24/2018 6:16,,22194,CC BY-SA 3.0 +27539,17529,0,packing is also possible aswell,2/24/2018 6:16,,22194,CC BY-SA 3.0 +27540,17529,2,There might be some indirect jumps to those instructions like jmp eax that IDA cant correctly resolve. It’s diffficult to say just by looking at an image,2/24/2018 6:27,,18014,CC BY-SA 3.0 +27541,17529,0,"yea, indirect jumps would make sense @PawełŁukasik",2/24/2018 7:00,,22194,CC BY-SA 3.0 +27542,17529,1,"switch to flat mode (space bar), then you'll see better the sequence of instructions.",2/24/2018 13:09,,60,CC BY-SA 3.0 +27543,17529,0,I don't believe the executable was packed. It was readable immediately after opening in IDA. The entry point was immediately detected. Patching isn't a bad idea.,2/24/2018 17:01,,13934,CC BY-SA 3.0 +27544,17529,0,@GrahamBest it is a homework assignment developed to teach undergraduates assembly/disassembly. It is not packed,2/24/2018 18:10,,18317,CC BY-SA 3.0 +27546,17527,0,"To actually do proper reverse engineering you'll at a minimum want to open it up in a disassembler and debugger to see what it's doing. IDA still the de-facto standard and has a free variant however it may not work for 64bit binaries. That being said, Rootkit.Fileless.MTGen is a generic detection and can be multiple different kinds of malware with a rootkit component",2/24/2018 21:06,,1306,CC BY-SA 3.0 +27547,17532,0,"Hi, thank you very much for your response and help. I really appreciate it. +I imagined that a weak (probably ""custom made"") algorithm was used, but it has been almost 3 months that I'm struggling with it and no results so far :-( +I also noticed that few 0x00 and 0xFF bytes are repeated so, do you think that a ""pure"" xor-encryption has been used? +I keep continuing with my research :-) +Thanks a lot.",2/25/2018 2:25,,23209,CC BY-SA 3.0 +27548,17465,1,You can not decrypt the SSL traffic. But you can try a MiTM: install a proper certificate on one of your server and divert the application traffic to it. If you are lucky it will just test the TLS connection succeeded without taking care of the content of the certificate. So first try that.,2/25/2018 4:34,,18945,CC BY-SA 3.0 +27549,17532,0,"I guess that the next step is to perform a frequency analysis on bytes (according to the differences between two versions, block size is most likely a byte). And, if this is a simple xor-encryption, a [Kasiski examination](https://en.wikipedia.org/wiki/Kasiski_examination) could help to discover the length of the Xor mask. But, if you want to know more about cryptanalysis of xor encryption, this should be another question. Also, don’t forget to mark this question as “answered” if you think it is solved.",2/25/2018 9:13,,53,CC BY-SA 3.0 +27550,17534,0,was it reclass?,2/25/2018 13:22,,22194,CC BY-SA 3.0 +27556,17534,0,IDA has the ability to do that,2/25/2018 18:12,user23101,,CC BY-SA 3.0 +27565,17540,0,For which instruction set architecture?,2/26/2018 3:33,,18317,CC BY-SA 3.0 +27567,17540,0,@SYS_V wondering for x86_64,2/26/2018 6:08,,22669,CC BY-SA 3.0 +27568,17540,1,what trick is in `xor-ing` register to get a zero? It's just math/logic.,2/26/2018 7:07,,18014,CC BY-SA 3.0 +27569,17541,1,There is also this lovely book https://www.amazon.com/xchg-rax-xorpd/dp/1502958082,2/26/2018 11:57,,1358,CC BY-SA 3.0 +27570,17541,0,"Right, I add it to the list!",2/26/2018 11:59,,53,CC BY-SA 3.0 +27573,17532,0,"Hi perror, I marked the question as ""answered"", however my question was a request for help to understand the algorithm used. +Anyway I will proceed with my research and I will try with the kasiski examination and the index of coincidence techniques. Thanks.",2/26/2018 14:26,,23209,CC BY-SA 3.0 +27574,17542,0,all the protocol is little endian,2/26/2018 14:32,,23321,CC BY-SA 3.0 +27575,17542,1,"My advice is to gather more examples. For example, your value could be the number of seconds that passed since a fixed point in time 3.143 million years ago. Or, the same but in milliseconds – then the zero point would be 2:27:08 at May 15, 1124 BC (which was a Saturday).",2/26/2018 14:59,,2959,CC BY-SA 3.0 +27576,17542,1,"Please try to post questions which have clear answers, not ask for vague ""advice"". Provide as much info as you can (e.g. where the data is coming from and why you think the listed date is correct).",2/26/2018 15:08,,60,CC BY-SA 3.0 +27577,17542,0,"I am quite a newbie. I try to learn fast, thank you very much for your comments. Please check my editing, hope it replies your questions.",2/26/2018 15:14,,23321,CC BY-SA 3.0 +27579,17542,0,"How old is this ""old"" device? There does not seem to be enough bits left of the first jumping value (which therefore must be 'minutes') to indicate a timespan longer than a handful of years. So how does it know we live in 2018? Do you need to reset or update it once a year?",2/26/2018 16:00,,2959,CC BY-SA 3.0 +27580,17542,0,The device is from 90'. I can confirm that we do not need to reset or update once a year.,2/26/2018 16:02,,23321,CC BY-SA 3.0 +27581,17542,0,Please add a couple of more examples with another date.,2/26/2018 17:22,,4658,CC BY-SA 3.0 +27582,17542,0,"ok! I'll do it tomorrow. I cannot change the date on the device from here. however, I just been able to force 0000 0000 0000 value in a way and obtained 31/1/1999 @usr2564301 may be right, probably the device has been fixed for the Millenium",2/26/2018 17:35,,23321,CC BY-SA 3.0 +27588,17546,0,"*Very* well spotted, but what about the time? Is it in ye olde DOS format as well?",2/26/2018 19:42,,2959,CC BY-SA 3.0 +27590,17546,0,This is great! Thank you. It would be great to learn how you approached this problem. Any guidelines? I see the second and third blocks as INT16 Little Endian minutes and milliseconds,2/26/2018 19:51,,23321,CC BY-SA 3.0 +27592,17546,0,"Thank you very much! tomorrow I'll post the next day data for double checking! However very well spotted, than you again!",2/26/2018 20:05,,23321,CC BY-SA 3.0 +27593,17546,1,@usr2564301 it is not in that format it is total minutes from 0 to now() i edited a calculation in the answer,2/26/2018 20:14,,3473,CC BY-SA 3.0 +27594,17546,0,@fparaggio this is the format used in zip headers but in zip headers it isnt y2k fixed so base year will be 1980,2/26/2018 20:15,,3473,CC BY-SA 3.0 +27609,2537,0,"You say ""if you strip the relocation table [...] then the Windows loader will try to load the DLL at its preferred base address"". So where does it try to load it otherwise? Isn't it the point, that Windows loads a DLL at its preferred base address, _unless_ its taken? I'm talking about non-ASLR case.",2/26/2018 22:57,,23428,CC BY-SA 3.0 +27611,16175,3,"That is correct, although it is not difficult to build Chromium from source with the Widevine Content Decryption Module included. + +http://www.linuxfromscratch.org/blfs/view/cvs/xsoft/chromium.html",2/27/2018 1:02,,21350,CC BY-SA 3.0 +27614,17532,0,"Well, I feel like I gave you an answer to what kind of ""encryption"" is used here. This cannot be a strong one, and the xor-cipher is the most usual one in these cases. If you want a complete cryptanalysis of the files, it will require more work and I think this is out of the scope of this question. As a hint for more investigation, you may refer to this [question](https://reverseengineering.stackexchange.com/questions/2062/what-is-the-most-efficient-way-to-detect-and-to-break-xor-encryption).",2/27/2018 9:37,,53,CC BY-SA 3.0 +27617,4611,0,"@PeterAndersson you should really add that note from glglgl in the answer. For instance, FORTH uses -1 to refer to true. It helps for me to think of this optimization as a quick way to set all the bits to 1.",2/28/2018 2:59,,22669,CC BY-SA 3.0 +27618,17555,0,Looks like it tried to disassemble data.,2/28/2018 3:56,,21642,CC BY-SA 3.0 +27619,17555,0,"@tkausl shouldn't DATA should the actual data, and not just add `add byte [rax], al`?",2/28/2018 3:58,,22669,CC BY-SA 3.0 +27620,17555,1,"I don't know radare2 but I think the `0000` is your data, i.e. its a chunk of empty (zero) memory.",2/28/2018 4:01,,21642,CC BY-SA 3.0 +27621,17556,0,"these are showing up in `pdb` entries though, why would things be seeking to an area with no data? Why would you ever have more than 8 bytes (64bits) of no-data for alignment?",2/28/2018 4:37,,22669,CC BY-SA 3.0 +27622,17556,2,"if you are on windows please download and read pe coff spec for section alignment , segment alignment etc dont assume that any alginment might be 8 max universally",2/28/2018 4:52,,3473,CC BY-SA 3.0 +27623,15491,0,File not found.,2/28/2018 12:05,,11830,CC BY-SA 3.0 +27624,16374,0,"@LievenKeersmaekers please try to avoid posting answers in comments, it's better to post an actual answer.",2/28/2018 13:18,,60,CC BY-SA 3.0 +27625,16374,0,"@IgorSkochinsky - impov, it's not fleshed out enough to serve as an answer and I don't have enough expertise on the subject to write a complete answer but I'll definitely take note!",2/28/2018 17:41,,1680,CC BY-SA 3.0 +27626,17556,0,"I'm still confused. If ix has numerious references to the point at which I seeked too, why would it be that there is neither data nor code? Why would these references be pointed to the padded area or the alignment area?",2/28/2018 20:19,,22669,CC BY-SA 3.0 +27627,17556,0,your question does not provide enough information to process and reply sensibly what do you think a declaration for a global char [] would look like in the binary space you can refer to the buffer in say sprintf and a bunch of zeroes would be what you would see your query as it stands is vague it may be might be can be are guess work answers based on wyaiwyg (what you ask is what you get),2/28/2018 20:28,,3473,CC BY-SA 3.0 +27630,17561,0,Is it a dead end? Should I care those string values?,2/28/2018 21:36,,23069,CC BY-SA 3.0 +27631,17561,0,it depends on the binary. Google search gives some links to Ubuntu subsystem for Windows - is that what you are looking at?,2/28/2018 22:10,,18014,CC BY-SA 3.0 +27632,17561,1,yes wsl.exe is linux subsystem for windows and those file names are src files that were used to compile (it remains there for using __ FILE __ debugprints,2/28/2018 22:32,,3473,CC BY-SA 3.0 +27633,17559,0,This answer truly goes above and beyond and illustrates some misunderstandings that I have. Thanks a ton @blabb. You're a gentleman and a scholar.,2/28/2018 23:37,,22669,CC BY-SA 3.0 +27634,17563,0,this might be some kind of debug messages I guess..,3/1/2018 7:26,,18014,CC BY-SA 3.0 +27635,17563,0,@PawełŁukasik those are predefined macros they are expanded to thier current values by preprocessor prior to compiling the code i added a link in the answer take a look,3/1/2018 7:45,,3473,CC BY-SA 3.0 +27636,17563,0,"I know the __FILE__ is a predefined, but I was commenting the fact of the fact of using it in a production code. I would expect to see it in Debug mode",3/1/2018 7:48,,18014,CC BY-SA 3.0 +27638,17563,0,@PawełŁukasik no they are not restricted to debug mode you can happily use them in release mode also i added a code sample too,3/1/2018 8:58,,3473,CC BY-SA 3.0 +27639,17563,0,"yes, I also know that :) but I was more wondering why would they be left there for release mode :) it's leaking a bit of info",3/1/2018 9:00,,18014,CC BY-SA 3.0 +27640,17563,0,hehe well may be you are presuming it is release mode may be they are not and to be frank if you consider __ FILE __ to be leak then you can extract all of these leaks from pdb too,3/1/2018 9:03,,3473,CC BY-SA 3.0 +27641,17566,2,"Your question is too broad, I think.",3/1/2018 11:03,,111,CC BY-SA 3.0 +27642,17532,0,"Hi Perror, yes you gave me an answer and I really appreciated that. +If you have time to help me more for this task I will appreciate it. +It has been a while (almost 3 months) that I'm trying to understand the algorithm that has been used, but no luck so far. +If you are interested on this project, [here] (ftp://219.84.35.58/brookhex/) you can find more firmware released by the same company. I'm pretty sure that they use the same algorithm for each product. +Anyway, thank you very much for your help and time. Regards.",3/1/2018 13:58,,23209,CC BY-SA 3.0 +27643,17543,0,"Beware, the optimization based on 'branch prediction' may become obsolete for the next generation of processors depending on what tampering mechanisms will be used to remove the Spectre and Meltdown flaws. Anyway, the rest of the document is quite impressive. Thanks for posting it!",3/1/2018 17:22,,53,CC BY-SA 3.0 +27647,17575,0,@dsambir is there a recommended tool for this?ida can do it? How can I check if my edit undamadge?,3/2/2018 4:46,,23460,CC BY-SA 3.0 +27648,15491,0,Updated the links.,3/2/2018 9:45,,3721,CC BY-SA 3.0 +27649,17576,0,what are the inputs that you control? can you effect the arguments of `ls -al`?,3/2/2018 11:56,user23101,,CC BY-SA 3.0 +27650,17576,0,"Check for how can you influence that command, it's most likely a system() call. Environment variables and command line arguments are the candidates. However, without disassembly, it's impossible to say.",3/2/2018 12:05,,111,CC BY-SA 3.0 +27651,17576,0,I have tried a lot of inputs with patterns but I cannot spot any influence in memory. I can show you disassembly but because of the fact that the file is stripped has no info about functions.,3/2/2018 12:24,,23466,CC BY-SA 3.0 +27652,17576,0,how do you know it's exploitable?,3/2/2018 12:26,,18014,CC BY-SA 3.0 +27653,17576,1,its an exercise and it says it is,3/2/2018 12:27,,23466,CC BY-SA 3.0 +27654,17576,0,Can you please share the elf file in some way so we can understand better?,3/2/2018 13:05,,23469,CC BY-SA 3.0 +27655,17576,0,"Of course, I uploaded it. The link is above. The directory that we must not have access in this case is /tmp",3/2/2018 14:08,,23466,CC BY-SA 3.0 +27656,3675,0,"Similarly to `UIApp`, You can also use `NSApp` as shorthand for `[NSApplication sharedApplication]` https://developer.apple.com/documentation/appkit/nsapplication/nsapp",3/2/2018 20:01,,21279,CC BY-SA 3.0 +27657,17580,0,"Thanks Igor, that seems to be the case and it all fits. However, can you clarify, why is there a multiplication in lea.",3/2/2018 22:37,,23468,CC BY-SA 3.0 +27658,17580,0,"@VladFedyaev there is no multiplication, it’s been factored out by the compiler. basically, 0x7FFFFFD6 is 0xFFFFFFAC divided by two without sign extension. I multiplied the equation so it’s easier to see where 0x2A is coming from.",3/2/2018 22:49,,60,CC BY-SA 3.0 +27659,17580,0,see also a similar trick here: https://reverseengineering.stackexchange.com/a/6272,3/2/2018 22:52,,60,CC BY-SA 3.0 +27665,17584,0,"@blabb It's code section. `mov dword ptr ds:[eax], 15` does not work either",3/3/2018 9:16,,5878,CC BY-SA 3.0 +27669,17173,2,Snowman possibly has memory leaks. It took 6+ Gb RAM while decompiling a small .so file,3/3/2018 17:06,,23482,CC BY-SA 3.0 +27670,17590,0,"please inline the image, or even better just paste the code",3/3/2018 19:59,,60,CC BY-SA 3.0 +27672,17589,0,Thanks for this response. I think I am going to go the driver route at this point and if it causes some head-aches I may escalate to a kernel mode debugger. Thanks. I am looking at using this driver here http://deroko.phearless.org/ring0.html,3/3/2018 20:44,,23370,CC BY-SA 3.0 +27673,17587,0,what kind of device it is? Did you open it and look at the components inside? Does the manufacturer provide firmware updates?,3/3/2018 20:56,,60,CC BY-SA 3.0 +27674,17587,0,The device is a USB stick for some reason I can't find out what microcontroller it has inside but I think it is phison but as I said the provided tool from phison can't find the stick and even programs like chipgenius can't see what controller it is so I am not certain,3/3/2018 21:06,,23479,CC BY-SA 3.0 +27675,17590,0,here is the code https://pastebin.com/yUt13qSL,3/3/2018 21:07,,21456,CC BY-SA 3.0 +27676,17590,0,"I meant to put it in the body, see the edit. it's best to keep content on this site, as external links have a tendency to disappear.",3/3/2018 21:12,,60,CC BY-SA 3.0 +27677,17590,0,"in [ebp+x], x should be a hexadecimal offset where the pointer moves to beyond ebp, i don't know how come it's your password unless it's the whole (ebp+x) that contains it.",3/3/2018 22:23,,12383,CC BY-SA 3.0 +27678,17589,0,i edited the post to include the antirdtsc winsbg script's link derokos fakerdtsc is fine,3/4/2018 7:29,,3473,CC BY-SA 3.0 +27680,17595,1,"(1) What are the source code bytes? (2) How did you try to change it? (Use [edit] to add this to your question, don't answer in a comment.)",3/4/2018 11:14,,2959,CC BY-SA 3.0 +27681,17584,0,I've just checked Hopper v4 and have no issues with assembling this instruction. There has to be something else. Can you post the binary?,3/4/2018 13:32,,18014,CC BY-SA 3.0 +27682,17593,0,How about decompiling and then parsing the C generated file?,3/4/2018 14:58,,31278,CC BY-SA 3.0 +27683,17584,0,@PawełŁukasik I'm running V3 version .. Guess that's the problem,3/4/2018 15:30,,5878,CC BY-SA 3.0 +27689,17593,0,"I can walk the AST. Actually, this is an approach that I use sometimes. However: what can I do if I don't have a decompiler for that specific processor? What if it's a VM?",3/4/2018 17:30,,111,CC BY-SA 3.0 +27692,17595,0,"You don't need to clear out much significant informations from beyond the inspected instruction if you expect much of an answer, more you excise boundaried from your code more we can't tell what's happening.",3/5/2018 0:01,,12383,CC BY-SA 3.0 +27694,17602,0,"Pardon, I should have clarified. I'm working on rtl8188efw.bin. However, any one should work. +From your knowledge of Intel 8051, does this look the legitimate start of a program rather than radare2 interpreting another another chip's ROM? +And, I'll look into radare2, that looks promising. Thanks a lot!",3/5/2018 2:20,,17826,CC BY-SA 3.0 +27695,17606,2,"There are 3 questions here : (1) How to reconstruct a dll from a memory dump of the process ? (2) Is it possible to remap the memory dump to recreate the original asm code ? and (3) Can we reconstruct the original functions/methods and decompile them in to C code ? I suggest that this be broken into 3 separate questions, be more specific in your question(s) , and then try to give a concrete example of what you'd researched so far and where you are actually stuck.",3/5/2018 5:52,,18402,CC BY-SA 3.0 +27698,8855,1,"Igor is right, Apple's `strip` can't remove sections. `-R` removes symbols and `-c` removes *all* sections (if I'm reading it right).",3/5/2018 13:50,,23503,CC BY-SA 3.0 +27700,17611,0,"Ok i misundertood do you need to compile a disassembled function in a new application ? i don't think it's feasible because the anatomic nature of asm code don't fit to be recompiled again, there is an example of boomrang that tries to recompiles a recovered code from ASM but it often fails.",3/5/2018 20:42,,12383,CC BY-SA 3.0 +27701,16881,0,"This is not strange since proc mon is designed to listen on desktop applications with UI's, it sets a windows hook on dll calls in order to capture r/w handles on registery and files/folders, ie famous user32.dll, if driver has its own endogenic tools to manipulate reg then procmon is way far to be in current of what's happening.",3/5/2018 22:48,,12383,CC BY-SA 3.0 +27702,17595,0,Thanks... that's what I told my wife when she asked me what I wanted to eat. ;),3/6/2018 1:06,,23488,CC BY-SA 3.0 +27703,17616,0,why you need to do it in Olly? can't you just copy bytes from one binary to the other at a specified offset? a simple python script would suffice,3/6/2018 4:32,,18014,CC BY-SA 3.0 +27704,17616,0,I actually just want olly. I don't program in python.,3/6/2018 4:58,,23515,CC BY-SA 3.0 +27705,17616,0,"well, than any other programming language",3/6/2018 5:02,,18014,CC BY-SA 3.0 +27711,17614,0,After brief looking into the files: this is definitely neither encryption nor compression (because of existence of strings and low entropy). I'd call this encoding.,3/6/2018 6:35,,2318,CC BY-SA 3.0 +27715,17614,0,@IrinThirdwater i added an answer and deleted the comments so doesnt like a prolonged comment session so please edit your question and i will edit my answer if there is some thing to add,3/6/2018 7:01,,3473,CC BY-SA 3.0 +27716,17614,0,Are you sure that uploaded files are the same as in your hex dumps ? When I downloading your files all of them are starting with EF BF BD EF BF BD which contradicts to hex dumps you posted in the question.,3/6/2018 7:43,,2318,CC BY-SA 3.0 +27718,17614,0,"Yes, I've noticed this now that both you and blabb pointed it out. I'm trying to understand what's going on at the moment. For now, I've included both versions of `battle_pvp_cost.json` to the question.",3/6/2018 7:57,,23489,CC BY-SA 3.0 +27719,17614,0,"FYI: 0xef 0xbf 0xbd is utf-8 character placeholder (see for example this SO question: https://stackoverflow.com/questions/25222973/weird-characters-in-url ). This probably means that your decoder just trying to present the json files as utf-8 encoded text according to extension - and it looks like that we need this files before the unpacker just as they ""seen in the unpacker"" as battle_pvp_cost_2.json .",3/6/2018 8:26,,2318,CC BY-SA 3.0 +27721,17620,0,Does this mean the export is irreversible since some characters have been lost? Right now I only have the battle_pvp_cost_2.json as the sole example of the file before the export. I will be able to provide more examples after I have access to my windows machine again if necessary.,3/6/2018 8:43,,23489,CC BY-SA 3.0 +27722,17620,0,yes if you have the exported data only then it means all the bytes at replacement characters are lost that said even if you had them you need the application that uses the binary data just posting a correct file (like the last one added to your question) wouldnt be of much help i think because that binary data doesnt appear to be a anything easily identiifable visually you need to find the function in an application which takes this blob and see what it does with it,3/6/2018 8:51,,3473,CC BY-SA 3.0 +27723,17611,0,"the function takes a dword from one of each equally spaced table does some magic with it and returns a dword you can see let a1 = 0x10000000 + let a2 = 0x20000000 + so v2 = 0x0000 + so v3 = 0x00100000 + + (0x20000000 + (4 * 0) + 3144) = dword[0x20000c48] + + (0x20000000 + (4 * 0) + 2120) = dword[0x20000848] ^ + (0x20000000 + (4 * 0) + 1096) = dword[0x20000448] + + (0x20000000 + (4 * 0) + 0072) = dword[0x20000048]",3/6/2018 10:06,,3473,CC BY-SA 3.0 +27724,17611,0,"@blabb Thanks, I've had a go at creating a function but can't get it compiled, I'm not too clever with C/C++. Could you write out a function please ?",3/6/2018 10:48,,23513,CC BY-SA 3.0 +27726,17620,0,"Finally got around to looking at the game files again and this looks like another big set of exercises on its own so I will be marking your answer as accepted for your help and guidance as well as for your patience. If I come across a script that operates on these json files, I will come back and update the questions or post a new one accordingly depending on how related it is by that point.",3/6/2018 14:15,,23489,CC BY-SA 3.0 +27727,17620,0,"Before we depart from this question, I would like to just clarify this function I should be looking for so that I can actually recognise one when I do come across it/them. If I am understanding things correctly, said functions would be reading one of these json files, and presumably perform some sort of decoding to extract some of its data, right? So my first goal would be to search for any of the names of these json files in the scripts.",3/6/2018 14:19,,23489,CC BY-SA 3.0 +27728,17620,0,you have summarized it correct i also edited my post with a short summary so have a look,3/6/2018 15:06,,3473,CC BY-SA 3.0 +27730,17611,2,since this question is closed you may have to start anew start by showing both the pseudo code and disassembly along with what you tried and where you are stuck no one may be writing you a replacement function but may provide you advice on how to write one yourself,3/6/2018 16:00,,3473,CC BY-SA 3.0 +27731,17615,0,I done have invokedynamic on the .class file I want to edit. But if I have invokedynamic on another .class file that call to my .class file ( that I edit on version 50) is that can be problem?,3/6/2018 16:32,,23460,CC BY-SA 3.0 +27732,17620,0,"Thank you so much! I understood the procmon (or its equivalent) now. So it's like another approach to dig into how the game uses these json files apart from looking for references from within the scripts. I will look into this, either I try to find a mobile equivalent or see how it plays out with emulators like bluestack.",3/6/2018 17:57,,23489,CC BY-SA 3.0 +27733,17615,0,Nope. Classes with different classfile versions can freely interoperate.,3/6/2018 18:40,,1739,CC BY-SA 3.0 +27734,17623,0,could you elaborate on names being special? Thanks,3/6/2018 20:09,,22178,CC BY-SA 3.0 +27735,11216,0,@usr2564301 probably he read some news about that when [Google started working on switching to Clang](https://arstechnica.com/gadgets/2018/03/chrome-on-windows-ditches-microsofts-compiler-now-uses-clang/),3/7/2018 5:41,,2563,CC BY-SA 3.0 +27736,17623,0,"Special names are `.bss`, `.comment`, `.data` `.debug`, `.dynamic`, `.dynstr`, `.dynsym`, `.fini`, `.got`, `.hash`, `.init`, `.interp`, `.line`, `.note`, `.plt`, `.rel`, `.rodata`, `.shstrtab`, `.strtab`, `.symtab`, `.text`",3/7/2018 6:14,,22987,CC BY-SA 3.0 +27755,17632,1,"I'm voting to close this question as off-topic because not only has the OP not even bothered to try it out himself first, but also did not even mention the IDA version that he's interested in.",3/8/2018 0:20,,18402,CC BY-SA 3.0 +27762,17635,0,I updated my question with the sha256hash of the sample,3/8/2018 10:33,,20848,CC BY-SA 3.0 +27764,13482,0,"IMHO, what you are referring is about ""static program slicing"". On the other hand, in terms of ""dynamic slicing"" which is performed on a execution trace, then it cares about a selected input as well (since one trace corresponds to one input).",3/8/2018 14:48,,3215,CC BY-SA 3.0 +27766,17633,0,"Very interesting effort, cheers!",3/8/2018 18:56,,12383,CC BY-SA 3.0 +27767,17604,2,"OK, so this malware is protected with the **VMProtect (v3.0.465)** with even a valid taggant.Since VMP is a commercial protector,would like the admins to comment whether it would violate the rules of this site if I discuss in detail the steps of finding the OEP and re-building the IAT, as asked by the OP. I would hate to spend a couple of hours writing an answer only to have it deleted, as I see happening quite frequently these days (sorry). Waiting for a confirmation to go ahead. Thanks.",3/8/2018 21:45,,18402,CC BY-SA 3.0 +27768,17604,0,waiting fingers crossed...,3/8/2018 22:22,,20848,CC BY-SA 3.0 +27769,13482,0,Could you provide a reference for static vs dynamic slicing?,3/8/2018 23:01,,15907,CC BY-SA 3.0 +27770,17633,0,"Do not forget that most optimizers deal with integer division by 2 directly by shifting to right, [see here](http://www.nullstone.com/htmls/category/divide.htm).",3/8/2018 23:08,,12383,CC BY-SA 3.0 +27772,17642,4,You should also mention syntia (https://github.com/RUB-SysSec/syntia). (Paper: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-blazytko.pdf),3/9/2018 10:10,,15907,CC BY-SA 3.0 +27773,17633,0,Thanks cHao for your lengthy explanation. It really helped me out and is much appreciated !,3/9/2018 11:09,,23513,CC BY-SA 3.0 +27774,17633,0,"errrmm, how do I accept the answer ? There doesn't seem to be an option.",3/9/2018 11:10,,23513,CC BY-SA 3.0 +27775,17633,1,Click the check mark next to an answer (near the vote buttons) to accept it.,3/9/2018 12:25,,6898,CC BY-SA 3.0 +27776,2009,0,"If they are not used as segment registers, is there a way to use `retf` instruction for example in 64 bit mode? I have been unsucessful trying to use this instruction, getting segfaults",3/9/2018 14:13,,16318,CC BY-SA 3.0 +27779,17646,0,"post the assembly too interpreting a pseudo interpretation without context is tedious unk means unknown (may be someone writes there during runtime ?? and it is unknown at the moment does assembly say mov eax, qword [unk]",3/9/2018 19:53,,3473,CC BY-SA 3.0 +27780,17633,0,"@cHao are you sure 4* x + const == x + const /4 for example 4 *2 + 8 = 16 wont be equal to 2 +4 = 6 you have some logic problem you are not adhering to BODMAS (bracket open , divide , multiply , add ,subtract) it is probably a2 +(v2 *4) + const and the const is 0x400 spaced buffer as i commented earlier please recheck your answer",3/9/2018 20:00,,3473,CC BY-SA 3.0 +27782,17646,0,so it is clear lea returns 14001C2B0 not the 0 lea is a speacial kind of move instruction that moves the address not the contents so v8 = 14001C2B0,3/9/2018 20:06,,3473,CC BY-SA 3.0 +27786,17646,2,"forget the unk it is a label and it has no meaning in c or d or go it is a name given by ida to that specific address try pressing d on the address the unk will change to byte , press d again it will beome word press d again it will become dword etc etc the code would be appromiximately v8 = &foo()",3/9/2018 20:28,,3473,CC BY-SA 3.0 +27790,17633,0,"@blabb: Your math is off. 8 / 4 == 2, not 4, making the new offset 2+2, aka 4 (aka 16/4). And my mention of the offsets was after doing the dword-pointer conversion, so the spacing is the number of dwords between arrays, not bytes. 256 dwords take 1024 (aka 0x400) bytes.",3/9/2018 20:36,,6898,CC BY-SA 3.0 +27791,17633,0,"ok if you are confident enough about what you wrote then i got no problem with it for me it appears to be dword [ x+48] + dword [x+448| ^ dword [x+848] + dword [x+c48] ,",3/9/2018 20:43,,3473,CC BY-SA 3.0 +27794,17633,0,"@blabb: I see it from C (where pointer math accounts for the type being pointed at, in this case 4). And I did the steps as I was writing them, in that order. (This whole answer was kinda my internal thought process as I was translating the code.) So for me, once `x` is a dword pointer, it's like `x[0x12] + x[0x112] ^ x[0x212] + x[0x312]` before introducing the struct.",3/9/2018 21:02,,6898,CC BY-SA 3.0 +27795,17576,0,I still don't know what kind of exploit it supposed to have. You have a folder that it's not accessible and an app that can list the files in it. Should you display content od one of the files or what?,3/10/2018 10:33,,18014,CC BY-SA 3.0 +27796,17648,0,"This regards the values of (var_8, var_14, var_20 and var_2C), if they are distanced less than 4 bytes, then 3 variables should de altered.",3/10/2018 11:26,,12383,CC BY-SA 3.0 +27799,17653,0,AFAIR One of my colleagues used manticore (https://github.com/trailofbits/manticore) for something like this. Any working symbolic execution engine should also fit.,3/11/2018 7:06,,2318,CC BY-SA 3.0 +27800,17658,0,@SYS_Y what Retargetable Decompiler diffrent than Binary Ninja. Witxh better? And they bettwr than ida psudocode??,3/11/2018 16:45,,23577,CC BY-SA 3.0 +27802,17659,0,https://binary.ninja/2017/10/01/automated-opaque-predicate-removal.html,3/11/2018 19:43,,18317,CC BY-SA 3.0 +27803,17659,0,http://www.msreverseengineering.com/blog/2014/6/23/control-flow-deobfuscation-via-abstract-interpretation,3/11/2018 20:00,,18317,CC BY-SA 3.0 +27805,17660,3,"Assuming it's not the only import from that DLL, why not just set that entry to the same value as another one rather than deleting it?",3/12/2018 3:48,user56,,CC BY-SA 3.0 +27807,17658,0,RetDec only works at present with 32-bit binaries. It has a 32-bit IDA Pro plugin for generating either C or pseudo-code.,3/12/2018 7:58,,4658,CC BY-SA 3.0 +27808,17663,1,Perhaps helpful: https://reverseengineering.stackexchange.com/questions/16060/how-tools-like-peid-find-out-the-compiler-and-its-version,3/12/2018 14:44,,15907,CC BY-SA 3.0 +27809,17663,0,"I would prefer not to rely on an external tool (which may be out of date or may not contain the appropriate signature). Also, I don't need the exact version, just the more general info if it is gcc or VS.",3/12/2018 14:45,,11830,CC BY-SA 3.0 +27811,17613,0,Can you accept my answer please?,3/12/2018 17:03,,1739,CC BY-SA 3.0 +27812,17666,3,are you sure it's `#0x28` and not `=#0x28`?,3/12/2018 19:40,,60,CC BY-SA 3.0 +27813,17663,0,some tools ideas also here: https://reverseengineering.stackexchange.com/questions/3362/how-to-know-in-which-language-technology-program-exe-is-written,3/12/2018 20:15,,18014,CC BY-SA 3.0 +27814,17654,0,Heey I read your articles about reversing FinFisher after I asked the question. After reading them I realized it was not as easy as putting a breakpoint on an API call. I learned a lot from them. Now I am trying to find the Vm exit instruction. It is not easy to do if you are dealing with VMProtect at least for me,3/12/2018 23:15,,20848,CC BY-SA 3.0 +27816,17670,2,it looks like you were too fast. Point 4 is incomplete and 5 is missing.,3/13/2018 8:10,,18014,CC BY-SA 3.0 +27817,17676,0,`upx -d` does not work?,3/13/2018 8:35,,60,CC BY-SA 3.0 +27818,17676,0,I eventually figured that out.,3/13/2018 9:13,,23599,CC BY-SA 3.0 +27819,17342,0,I have same radio RCD330 plus. Hardware version is 5GD 035 280 B. Have you succeded in installing German language into the radio? Can you please give information regarding how can I connect radio to install language package?,3/13/2018 10:44,,23602,CC BY-SA 3.0 +27823,17681,1,Can you share the original code? We will be able to explain better,3/13/2018 13:43,,18698,CC BY-SA 3.0 +27824,17681,0,also check this: https://reverseengineering.stackexchange.com/questions/15943/how-work-this-obfuscation-and-how-deobfuscate,3/13/2018 13:46,,18014,CC BY-SA 3.0 +27825,17682,0,"Thanks for rendering the code, knew I could just ""alert"" it in a debugger to show what it is meant to execute (all the junk is wrapped in eval) but I'm insanely curious about the nature of the transformations. Your last comment (about the minimal dictionary) is pointing more to where I'm currently stuck.",3/13/2018 14:28,,23603,CC BY-SA 3.0 +27826,17682,0,@LukeSmith there is even more of fun that is going to be lightshed !,3/13/2018 14:30,,12383,CC BY-SA 3.0 +27828,17682,0,"thanks for investing the time into that. Hopefully you did so before you noticed my link to https://blog.korelogic.com/blog/2015/01/12 which starts to demystify the same. Check out the 3rd property in the ""here's where I'm at"" object. The name begins with an integer and has a space: `1 $: 4` Dwight Shrute voice: what does that mean?",3/13/2018 15:54,,23603,CC BY-SA 3.0 +27829,17681,0,@PawełŁukasik thanks - highly relevant resource! I'm still a bit stuck on something that I hope is a basic JavaScript rudiment which I lack.,3/13/2018 16:07,,23603,CC BY-SA 3.0 +27830,17682,0,"@LukeSmith I'v gone through that by myself, I didn't read the blog, also i don't know how you came into `1 $: ++$` it bears no sense to me and has no interpretation from the console.",3/13/2018 16:14,,12383,CC BY-SA 3.0 +27831,17682,0,"what's the third property of the referenced object translate to for you, did you get that far? Specifically the property name (I assume my value was correct but the name is what is confounding me.)",3/13/2018 16:39,,23603,CC BY-SA 3.0 +27832,17674,0,"I not sure I get you , (I know what is register) if I see `ldr r0 #0x28` so in r0 will be the string that in 0x28 address?",3/13/2018 16:42,,23594,CC BY-SA 3.0 +27833,17674,0,"No, the value 0x28. An immediate value is a **value**.",3/13/2018 16:44,,53,CC BY-SA 3.0 +27834,17682,0,"@LukeSmith it is unsyntactic may be you mean to write `'1 $': ++$,` ?",3/13/2018 17:09,,12383,CC BY-SA 3.0 +27837,17674,0,so r0=0x28 (Value?) that strange becuase I saw it on loop that `ldr r0 #0x28` and `ldr r1 #0x32` and that happend every loop and after that check r0 and r1 are equal so get out from loop . so if it assign of 0x28 and 0x32 they aways be not equal,3/13/2018 18:00,,23594,CC BY-SA 3.0 +27838,17674,0,I cannot comment if I cannot see the code...,3/13/2018 18:03,,53,CC BY-SA 3.0 +27839,17674,0,ok so you tell that `ldr ro #0x28` so r0=0x28(value ) can you please tell me what does it mean `ldr r0 =0x1234`? that mean that r0 get the value that store on 0x1234?,3/13/2018 18:10,,23594,CC BY-SA 3.0 +27840,17682,0,You tell me! I'm asking because I don't know. :) but yes – that line is where I am stuck.,3/13/2018 18:14,,23603,CC BY-SA 3.0 +27841,17682,0,"@LukeSmith share all the code, i'll be able to give help for this little stump.",3/13/2018 18:23,,12383,CC BY-SA 3.0 +27842,17689,0,why do I need the .text section? do you know tool for windows?,3/13/2018 19:47,,23422,CC BY-SA 3.0 +27843,17682,0,I can post it later - but then how did you successfully translate the preceding line without the full set of code? I'm trying to translate that one line.,3/13/2018 19:54,,23603,CC BY-SA 3.0 +27844,17682,0,a wild guess ...,3/13/2018 19:56,,12383,CC BY-SA 3.0 +27849,17692,0,ok thanks for the response but what do you mean by dig deeper? Is the code I'm looking for still in the app binary or elsewhere?,3/14/2018 1:56,,23610,CC BY-SA 3.0 +27850,17465,0,"You can try MiTM as Patrick says, also you can inspect traffic after it is decrypted.",3/14/2018 6:29,,18804,CC BY-SA 3.0 +27852,17694,0,"I see. However, the freeware version does come with support for a local debugger. I am yet to find anything that says explicitly that it doesn't come with support for remote debugging. I am confused.",3/14/2018 7:09,,15582,CC BY-SA 3.0 +27853,17694,0,Thanks! I didn't know that. Updated my answer according to what you and blabb mentioned.,3/14/2018 7:26,,18698,CC BY-SA 3.0 +27854,17692,0,it's in one of the unity dll's - but why do you need the code for that? Shouldn't you just set a value to whatever `targetFrameRate` you want?,3/14/2018 7:34,,18014,CC BY-SA 3.0 +27855,17695,0,"yes, i tried running both 86 and 32b of IDA7.x, the executable clashes with system architecture.",3/14/2018 8:12,,12383,CC BY-SA 3.0 +27857,17685,0,clsid is guid which is a structure either create the struct and apply it or create a 16 bytel long array with numpad * button,3/14/2018 8:43,,3473,CC BY-SA 3.0 +27860,17663,2,You can take a look at the rich header,3/14/2018 15:15,,2221,CC BY-SA 3.0 +27861,17663,1,What is the rich header?,3/14/2018 16:33,,11830,CC BY-SA 3.0 +27867,17696,0,"An IID is a globally unique identifier (GUID) value, so they are the same.",3/15/2018 12:09,,99,CC BY-SA 3.0 +27869,17692,0,"ah it's ok I understood what you meant. Found the value, changed it, didn't do much. That was expected though, Thanks for your help.",3/15/2018 12:46,,23610,CC BY-SA 3.0 +27875,17708,2,"99% sure the plugins are, simply, not ported to IDA 7.0.",3/16/2018 8:54,,111,CC BY-SA 3.0 +27880,17712,0,"@usr2564301 sorry, I don't get your point.What do you mean to say and how do I achieve what I want to achieve in this crackme ?",3/16/2018 19:17,,23636,CC BY-SA 3.0 +27891,17712,0,@usr2564301 please don't use comments for answers. better make a proper answer and explain the reason.,3/17/2018 20:13,,60,CC BY-SA 3.0 +27894,17712,0,"@IgorSkochinsky: I can't tell OP how to properly do it. (OP also did not understand my comment, so nothing lost there.)",3/17/2018 21:01,,2959,CC BY-SA 3.0 +27895,17712,0,"@usr2564301 it could still be helpful for others having a similar issue... comments should be used to ask for clarifications, not answers (or attempts of)",3/17/2018 21:04,,60,CC BY-SA 3.0 +27896,17716,0,"That makes sense - so, a unique undefined instruction is desirable because it's effectively a marker noting what body of code wanted to indicate that an error occurred (and if the Go code shared the same undefined instruction as is used by BUG_INSTR, it'd be more difficult to distinguish between errors raised by either.)",3/17/2018 22:55,,23588,CC BY-SA 3.0 +27900,11196,0,"he said ""load"" not ""execute""",3/18/2018 23:23,,12383,CC BY-SA 3.0 +27902,11196,1,"Really -_- ... did you even read the answer ? +[.... in order to load it into olly.....] + @Abra001",3/19/2018 9:16,,13977,CC BY-SA 3.0 +27903,17663,3,http://www.ntcore.com/files/richsign.htm,3/19/2018 9:59,,2221,CC BY-SA 3.0 +27904,17722,1,Unfortunately this question is poorly suited for this site; we mostly deal with binary/low-level analysis and not much source code. You will probably have better luck on Stack Overflow.,3/19/2018 10:03,,60,CC BY-SA 3.0 +27907,17731,0,How can I compile it so the compiler will not stores parameters and local variables in the local stack frame?,3/19/2018 10:17,,23664,CC BY-SA 3.0 +27908,17731,0,"use optimization flags as I mentioned, however in complex functions the compiler may run out of free registers and fall back to the stack for temporary storage anyway",3/19/2018 10:20,,60,CC BY-SA 3.0 +27912,17731,0,"can you give me the full command line you enter to gcc to compile c code to arm 32 bits, (fast call calling convenction)",3/19/2018 10:53,,23664,CC BY-SA 3.0 +27914,17731,0,"any ARM compiler will give you “fastcall” since the standard ARM ABI uses registers for argument passing. anyway, such question is more suited for Stack Overflow since it’s about programming and not RE.",3/19/2018 11:43,,60,CC BY-SA 3.0 +27916,17734,2,labels are only artificial way of marking offsets/addresses in assembly. There are none in the binary.,3/19/2018 12:44,,18014,CC BY-SA 3.0 +27918,17734,0,so I only need to add 2 branch instructions ? is that the beast way to do what I need?,3/19/2018 12:46,,23664,CC BY-SA 3.0 +27919,17734,0,"show the disassembly of the code in the object file, not the assembly code generated by the compiler from the source code.",3/19/2018 12:51,,18317,CC BY-SA 3.0 +27920,17734,0,"@SYS_V I ask about the assembly that I show, that general quastion , after that I see how can I include you answer on my code.",3/19/2018 13:04,,23664,CC BY-SA 3.0 +27921,17734,0,"You say you want to edit the binary file, so show the code in the binary file.",3/19/2018 13:08,,18317,CC BY-SA 3.0 +27922,17734,0,"@SYS_V I am not with my PC now, I just compile the source code I show with GCC to arm 32 bits, (what I show is from online site) but If you want( i will thank you) you can compile and view/upload the binary compilation and answer on your binary, I will undersatnd that",3/19/2018 13:20,,23664,CC BY-SA 3.0 +27923,17731,0,"I only want get the command line you run on gcc(on win/linux) to compile it for arm 32 bits, I not think to open it new topic on stackOverFlow",3/19/2018 13:50,,23664,CC BY-SA 3.0 +27924,17731,0,"this is not a forum, sorry. please use comments for commenting on the actual questions and answers.",3/19/2018 14:10,,60,CC BY-SA 3.0 +27925,17738,0,if I add branch to `0x401d1c` after `0x00401cee` so all the instructions will changes address,3/19/2018 21:06,,23664,CC BY-SA 3.0 +27927,17738,0,"if I add new instruction after 0x00401cee so he new instruction will be locate in 0x00401cf0 and so that all of instructions changed place , so all the link (function call and offset will damage)",3/19/2018 21:12,,23664,CC BY-SA 3.0 +27929,17738,0,i added a comment on how you are supposed to patch in the answer see if that makes any sense,3/19/2018 21:33,,3473,CC BY-SA 3.0 +27930,17738,0,"I read your comment but I not get you, can you please explain again? I think that if I add branch so all the offset on binary file will damade. If I edit instruction to branch ( if it less or equal byte compare to branch) so the instruction that I replace will missing to binary",3/19/2018 22:18,,23664,CC BY-SA 3.0 +27931,17738,0,not sure get someone to translate the comment what i meant is you should overwrite the bytes and then in the destination after you do what you want to do you should also do all the operations that you destroyed while patching,3/20/2018 4:43,,3473,CC BY-SA 3.0 +27932,17656,0,i dont know if mac version 7 does debugging the old free version 5.0 had debugging capabilities in x86 windows not sure if there was a free mac 5 version,3/20/2018 6:53,,3473,CC BY-SA 3.0 +27934,17739,0,"Hi, thanks for your reply, I have edited the first question so it contains my answers to your suggestion.",3/20/2018 16:59,,23669,CC BY-SA 3.0 +27935,17739,0,"Your question is now completely different. As written, my original response is no longer appropriate for what you are asking currently, even if it mostly solved your original problem. You should have asked a new question instead of drastically editing your existing one.",3/20/2018 17:22,,182,CC BY-SA 3.0 +27939,17739,0,"Hi again, I undid the changes on the first question, and will create a new question. Thanks for your help.",3/20/2018 19:23,,23669,CC BY-SA 3.0 +27941,17755,0,This argument gets passed via register. Take a look at x64 calling conventions.,3/21/2018 4:42,,22819,CC BY-SA 3.0 +27942,17757,0,"Thank you for your answer! However, as you can see in my code, there is no extra `cmp` instruction. With the `cmp` is obvious to understand, but I still can't figure out what my example C code can be.",3/21/2018 6:44,,3302,CC BY-SA 3.0 +27944,17758,1,Have you considered trying [Triton](https://github.com/JonathanSalwan/Triton)? Or any symbolic execution based analysis tool?,3/21/2018 16:30,,53,CC BY-SA 3.0 +27945,17760,0,Jump targets are calculated using heap data as input. I believe it may be possible to reverse engineer nut there are a lot of subroutines.,3/21/2018 17:52,,23370,CC BY-SA 3.0 +27946,17758,0,I have looked at Triton (and angr) but the code I am studying is unpacked and written to memory during execution and has a lot of anti-debugging techniques. So I'm not sure how to use the tool. Would it work to run it and them dump the executable and do symbolic execution on that? Then I don't have any state information.,3/21/2018 18:47,,23370,CC BY-SA 3.0 +27947,17760,0,"@Jeremy okay, that does indeed smell like a vm. If it was just obfuscated jumps, you could have calculated the predicates with symbolic execution and patched in the original jumps. Now I fear you have to understand what’s going on. Maybe tracking memory accesses could give you an idea where the virtual IP is, etc. ?",3/21/2018 18:51,,23656,CC BY-SA 3.0 +27948,17758,1,"It mainly depends on the complexity of the packer. If it relies heavily on crypto and on low-level system calls, then you can forget about these tools. But, if this is only easy compression or encoding, then it is still possible (though the symbolic execution is not really efficient against packers).",3/21/2018 18:55,,53,CC BY-SA 3.0 +27949,17758,0,@perror Do you know if there is there any way I can capture a state or something to that effect mid-way through execution and use it with angr? I'll run it through angr and see what I get anyways; but I'm skeptical how useful the output could be.,3/21/2018 18:58,,23370,CC BY-SA 3.0 +27950,17760,0,"Hey Manduca, yeah its very possible to reverse engineer the algorithm from what I can see. I'll need to find a way to automate it though because there are over 60 subroutines easily where I'd have to do this. The control flow I expected was a loop and some branching but what i see is a ton of branching all over the place. So its either multiple vms or maybe I am missing something. + +This difficulty is finding out what the instructions do because they jump through a lot of obfuscated code.",3/21/2018 19:00,,23370,CC BY-SA 3.0 +27951,17758,0,"Well, if you can create a core file at some point, I am quite sure that the binary loader of angr has an entry to load those files (see [here](https://github.com/angr/angr-doc/blob/master/docs/loading.md#backends)). But, I never tried it...",3/21/2018 19:05,,53,CC BY-SA 3.0 +27952,17758,0,"Ah, is it a PE or an ELF binary file ?",3/21/2018 19:06,,53,CC BY-SA 3.0 +27953,17758,0,Its a PE binary file,3/21/2018 19:08,,23370,CC BY-SA 3.0 +27954,17758,0,"Damn, so I really do not know how to do (I am really not acquainted with PE files... sorry).",3/21/2018 19:10,,53,CC BY-SA 3.0 +27955,17758,0,No problem. Thanks for the insight :) I'll find a way to get a core dump.,3/21/2018 19:15,,23370,CC BY-SA 3.0 +27956,17760,1,@Jeremy i just saw your conversation with perror. Weirdly enough a few days ago i wanted to dump a process in windows and then do some emulation on that state with unicorn. I ended up dumping as windows minidump (e.g. by right-clicking in process explorer) and then parsing that with https://github.com/utds3lab/sigpath/blob/master/scripts/minidump.py . Maybe you could do something similar for angr?,3/21/2018 19:29,,23656,CC BY-SA 3.0 +27957,17757,0,shr shifts the discarded bit into cf flag and checking carry flag is not easily codable in c ( are you sure if this snippet is not a part of handmade asm inlined etc i edited my answer and added a c evenorodd versus asm_evenoradd asm code uses jae and both code are comaparably similar,3/21/2018 21:11,,3473,CC BY-SA 3.0 +27959,17757,0,"Well, I'm analyzing some binary code, I cannot assume this was not hand made, but my current assumption is that the code was C and heavily optimized. I just can't think of that piece of code that this might have come from, and given the answers I guess nobody thinks this came from C either.",3/22/2018 4:38,,3302,CC BY-SA 3.0 +27960,17754,0,"This is equivalent to checking if the considered value is odd or even. And, it jumps if odd.",3/22/2018 8:08,,53,CC BY-SA 3.0 +27961,17764,0,"The assembly code is better than the original source code, it tells you exactly what happens. What you look for: start looking for the error message which is printed when your license key is wrong, and work back from there.",3/22/2018 9:04,,1842,CC BY-SA 3.0 +27963,17769,0,"Thanks, this is more visible (for me) in x32dbg, is more easy to read. Many thanks",3/22/2018 15:28,,23512,CC BY-SA 3.0 +27971,17770,0,"A quick inspection suggests that the compressed data in IMM is some form of run length encoding, based on the (xor) difference in pixel values compared to the previous row.",3/22/2018 22:12,,4731,CC BY-SA 3.0 +27973,17757,0,well goodluck and update the question or write a self answer if you find out just to whet my curiosity i grepped for the pattern in all windows exes and i didnt happen to find an exe that used the construct,3/23/2018 5:33,,3473,CC BY-SA 3.0 +27974,17760,0,"Thanks for the advice, what does this minidump script do?",3/23/2018 7:26,,23370,CC BY-SA 3.0 +27975,17770,0,"@IanCook, I have checked this and you absolutly right! Thx.",3/23/2018 7:34,,23707,CC BY-SA 3.0 +27976,17760,0,@Jeremy it allows you to parse minidump format. I used this to recreate the process (all memory content and permissions) in unicorn emulator.,3/23/2018 8:20,,23656,CC BY-SA 3.0 +27977,17757,0,"Thanks for all your help and great examples. Well, this actually came from an MS-DOS executable, so maybe new compilers do different tricks. I'm trying to find out what compiler was used for this, but that's also becoming a bit difficult. I'll update here if I ever find out, thanks again!",3/23/2018 9:35,,3302,CC BY-SA 3.0 +27979,17770,1,@HenadziMatuts please provide the solution as an answer so we can a) close this question and b) share the knowledge,3/23/2018 14:49,,99,CC BY-SA 3.0 +27980,17751,0,"Hello, Thanks, It worked by Rebasing the segments.",3/23/2018 20:28,,23669,CC BY-SA 3.0 +27981,17774,0,Is there a newer alternative? It appears this one doesnt support ecma6+,3/23/2018 21:41,,23356,CC BY-SA 3.0 +27982,17784,1,"Well done! As for the type of compression: this is an old game, it would be rather unusual to find any ""real world"" compression applied to it; they tend to use something cobbled up by the programmers at the spur of the moment, ""whatever decreases the size"". It is clearly based on RLE, and I suppose the XOR thing was an attempt to increase compression on slightly different data, comparable to PNG's row filters.",3/24/2018 18:17,,2959,CC BY-SA 3.0 +27987,17788,1,do you really need to use the tool that is still mentioning Win 3.1? Why W32dasm and not some new one?,3/25/2018 5:29,,18014,CC BY-SA 3.0 +27988,17788,0,"Because it has a more better way to show all string data references so I can find the text strings easier others like olydbg does not have this option it seems that I can find string references on windasm32 better than I can find them on ollydbg , ollydbg does not show some strings like windasm32 so yeah are you going to help me out on this issue of mine or ?",3/25/2018 5:42,,23729,CC BY-SA 3.0 +27989,17788,0,I am running Windows 10 not windows 3.1,3/25/2018 5:47,,23729,CC BY-SA 3.0 +27991,17788,1,omg this stopped working correctly since windows 2000 that's almost a quarter century back please get yourself familiarized with new tools most the new rookies on the block weren't even born then and wouldn't even know what this dinosaur is or was,3/25/2018 6:08,,3473,CC BY-SA 3.0 +27992,17788,0,Well how do I find string data references in IDA Pro,3/25/2018 6:11,,23729,CC BY-SA 3.0 +27993,17788,0,And I need help on my first question I posted does anybody know how to fix this issue with the memory I mean seriously i need help,3/25/2018 6:12,,23729,CC BY-SA 3.0 +27994,17790,0,off_180052510 and sub_180049410 appears to be two distinct addresses what do you mean when you write they are same,3/25/2018 8:46,,3473,CC BY-SA 3.0 +27995,17790,0,I mean to say that the offset points to that subroutine.,3/25/2018 8:47,,23069,CC BY-SA 3.0 +27996,17791,0,"Correct. It just a convenient *shorthand* notation for ""load a large constant from a nearby address"". It is not an instruction in itself; a disassembler may choose to show it that way, but the actual code is something different.",3/25/2018 11:07,,2959,CC BY-SA 3.0 +27998,17792,0,"This is a very basic question, it's a good idea to read up on Thumb instruction encoding - and take care of the byte order, the instruction itself is a 16-bit instruction 0xE009 (see http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0210c/CACBCAAE.html). Branch offsets are 2's complement numbers, so you simply replace the least significant 11 bits of the 16-bit word with the offset shifted one bit to the right (since Thumb instructions only start on even addresses).",3/25/2018 11:59,user22967,,CC BY-SA 3.0 +28001,17798,1,It should work with globals too. Just use operand number 0.,3/25/2018 14:47,,2318,CC BY-SA 3.0 +28002,17798,0,"Thanks, @ws! I've updated the post with an answer below, but I'm afraid this steals your rep. If you repaste the same (or similar content), I'll remove my answer and accept yours. Thanks again!",3/25/2018 16:04,,17194,CC BY-SA 3.0 +28004,17791,1,"If you're curious about what immediate values can be represented in the instruction directly, I thought this was a nice resource: https://alisdair.mcdiarmid.org/arm-immediate-value-encoding/",3/25/2018 19:17,,257,CC BY-SA 3.0 +28006,17801,0,"my guess is this restricts the set of characters that is recognized by the algorithm. it looks like ASCII 0-9, A-F, and a-f all have bit four set (0x80). other ranges of printable and non-printable characters seem to have different sets of bits set (punctuation 0x10, uppercase letters 0x01, lowercase letters 0x02, non-printable 0x02, whitespace 0x28).",3/25/2018 23:41,,17194,CC BY-SA 3.0 +28008,17801,2,Check out the C functions defined in .,3/26/2018 5:35,,4731,CC BY-SA 3.0 +28014,8737,0,Which browser are you using?,3/26/2018 12:11,,14051,CC BY-SA 3.0 +28016,17812,1,"Thank you very much for wopO `dr ebp` & wopO `?v ebp`.And Yes, I did notice however from the link which I have been following the exercise second part was to get a reverse shell.",3/26/2018 12:40,,23694,CC BY-SA 3.0 +28019,17811,1,I think the exact file depends on the MSVC/CRT version you are looking at.,3/26/2018 13:43,,4731,CC BY-SA 3.0 +28020,17811,0,"these #defines are in corecrt_wctype.h in w10 includes may be it depends on crt versions grep -h -A 12 -r ""#define _UPPER"" ""c:\Program Files\Windows Kits\10\Include\10.0.16299.0\ucrt""",3/26/2018 17:16,,3473,CC BY-SA 3.0 +28021,17811,0,"With that in mind, some further debugging seems to undermine your answer. I could verify for different passwords, that the algorithm uses only certain characters for the encryption. + +I guess the original developer tried to add another element of unpredictability through that.",3/26/2018 17:52,,23743,CC BY-SA 3.0 +28022,17815,0,you mean some part of code inside a single binary gets loaded at different addresses ? or you mean the dlls gets loaded at different address if it is later then it could be due to aslr (address space layout randomisation),3/26/2018 18:58,,3473,CC BY-SA 3.0 +28023,17815,0,"I can not tell that for sure, but i suspect the code that always gets loaded in the same place is a statically linked library, while the programm itself is randomly loaded into some memory block. + +This is what aslr does if i got that correcly, isn't it?",3/26/2018 19:12,,23743,CC BY-SA 3.0 +28024,17815,0,In x64dbg you can see which module you’re in when you’re looking at the code. Everything is stored in the database in relative addresses so ASLR should not be a problem. Could you show a screenshot of the debugger when looking at this code?,3/27/2018 8:57,,2221,CC BY-SA 3.0 +28026,17815,0,"Sure, I added a screenshot to the original question.",3/27/2018 10:36,,23743,CC BY-SA 3.0 +28028,17823,1,"it says on the screen, decompiler generated values can't be evaluated. There's nothing about it being static or not",3/27/2018 14:16,,18014,CC BY-SA 3.0 +28030,8737,1,Chrome browser.,3/27/2018 15:50,,11905,CC BY-SA 3.0 +28038,17815,0,does 43exxx 438xxx belong to your main module the one you are loading or attaching to ? if yes then that address change is because of aslr,3/27/2018 19:01,,3473,CC BY-SA 3.0 +28042,8737,0,"Of particular note there is the ""Copy as cURL"", which will give you the full curl command to exactly reproduce the HTTP request. This can be helpful if the site checks user agents / referers / cookies etc.",3/27/2018 23:10,,257,CC BY-SA 3.0 +28043,10605,0,Which tool is best to use in Linux to generate cfg from existing assembly?,3/28/2018 5:10,,23758,CC BY-SA 3.0 +28048,17822,1,"@Sigtran I am reverse engineering a program that has an expensive process at the end of its function, I am trying to skip through this bit sometimes and debug it some other times. No, I can't simply open the program manually...",3/28/2018 20:40,,23763,CC BY-SA 3.0 +28049,17825,0,You're right. I think it was a bug that it wasn't registering the disabled breakpoints. Thanks,3/28/2018 20:40,,23763,CC BY-SA 3.0 +28050,17834,0,ask on Stackoverflow,3/28/2018 21:12,,18317,CC BY-SA 3.0 +28051,17837,0,"tools from tuts4you didn't. +I tried !sos.DumpDomain in windbg https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugging-managed-code + +Got few unknow modules, maybe these are these dll's? +is there any way to export them?",3/28/2018 22:41,,23786,CC BY-SA 3.0 +28052,17837,2,You seem to have ignored my answer entirely. I'd suggest reading it again.,3/29/2018 1:27,,182,CC BY-SA 3.0 +28053,17839,0,"mov[addr] , value mov regisrer,[addr]",3/29/2018 3:08,,3473,CC BY-SA 3.0 +28054,17835,0,https://stackoverflow.com/a/957652/2967945 should work for you. It might have a length field.,3/29/2018 7:19,,14622,CC BY-SA 3.0 +28056,17832,0,"oh thanks manduca, it worked, you are my savior! not sure this was clear in the specifications.",3/29/2018 11:30,,23780,CC BY-SA 3.0 +28057,17832,0,"In my understanding your code should have worked. +Maybe it would have if you had ended with PIN_ExecuteAt(ctx). +I have the feeling the documentation is not very clear and every release has other quirks. Still an awesome tool.",3/29/2018 11:48,,23656,CC BY-SA 3.0 +28058,17832,0,"yes I also tried this PIN_SaveContext(&snapshot, ctxt) and PIN_ExecuteAt(ctx) as in some examples I found on Github but I ended up with weird behaviours with TracerPIN",3/29/2018 12:00,,23780,CC BY-SA 3.0 +28059,17840,0,"Thank you for your help, but what is the difference between your script and +break x if ((int)strcmp($rdi, ""pol"")) == 0"" ? + +I would like to break anywhere not just X just break when r1 is equal to a string no matter in which function i am isnt that possible ?",3/29/2018 13:31,,21219,CC BY-SA 3.0 +28063,16287,1,"Someone with a real-life connection to SoftICE??? I'm dying to know, if you have the answer, why BPR was removed in the 4.x line. It technically would have still worked; in fact, some third-party extensions added the feature back.",3/29/2018 18:14,,182,CC BY-SA 3.0 +28064,17839,0,Could you elaborate a little? What's value here?,3/29/2018 19:35,,23763,CC BY-SA 3.0 +28068,17840,0,iirc gdb has no such feature. However you can use Intel PIN and instrument on the instructions where r1 is changed. Your other option is just to fetch all the instructions which change r1 in a disassembler and set conditional breakpoints.,3/30/2018 4:42,,14622,CC BY-SA 3.0 +28072,17839,0,"Before I post an answer, let me clarify a few things to make sure I have your question right. 1) You want to find the hard-coded 55 in memory, but you don't know the address. 2) You want to change the value in that memory address to whatever is in the user_value mem address, of which you also do not know. Is this value one you can change multiple times during execution? 3) Are you just assuming that mov instruction, or do you know the value is being read just like that? 4) Have you ever used memory scanning, like via Cheat Engine? If not, that's the path I'm going to answer you with.",3/30/2018 13:07,,20928,CC BY-SA 3.0 +28073,16287,0,"Unfortunately I cannot answer that question. Because I don't know the answer. We are the custodians of the source code, but we aren't experts in it. The last people who knew the code were laid off in early 2007. The closest things to any part of SoftICE that we still maintain in working condition are parts of BoundsChecker.",3/30/2018 18:00,,21498,CC BY-SA 3.0 +28075,17858,0,Well it's too easy :-),3/30/2018 21:32,,21438,CC BY-SA 3.0 +28076,17051,0,Tip: ConfuserEx will unpack the target during runtime and keep it in memory. You can dump it using dnSpy Debugging. I think the name of the unpacked module was `koi` or something like that.,3/31/2018 9:12,,20183,CC BY-SA 3.0 +28078,13309,0,Hi desu were you able to solve this using Nirlzr explanation below? I'm stuck with the same problem,4/2/2018 6:21,,23848,CC BY-SA 3.0 +28082,17874,1,http://reverseengineeringtips.blogspot.com/2015/01/an-introduction-to-x64dbg.html,4/2/2018 19:23,,20928,CC BY-SA 3.0 +28089,17872,0,"The x64 calling convention passed the first 4 parameters in registers, but the others in stack. Because of this, if the function definition is not known by the decompiler, it is hard to distinguish additional parameters from setting value of local variables. Since the PathAllocCombine function was called at the start of the function, the 5th and 6th may be just local variables. However, it is only a guess without the assembly code.",4/3/2018 7:21,,12325,CC BY-SA 3.0 +28095,17862,1,Can you dump more sample values?,4/3/2018 11:18,,14622,CC BY-SA 3.0 +28099,17881,0,"you cannot use the address shown in ida due to reasons like aslr , non availability of preferred base etc etc 2) you cannot add the result of getmodulehandle with an absolute address you need to read about rva find the rva add the rva to loaded base and use that address or if the function is exported use GetProcAddress() you have a lot of reading ahead",4/3/2018 18:53,,3473,CC BY-SA 3.0 +28107,17895,0,"How did you get void* [4] ? Why not void* [2] ? When I use [4] IDA shows error ""New variable size is bigger than the old one"".",4/4/2018 13:11,,23069,CC BY-SA 3.0 +28108,17895,0,"Yes the array will be bigger then initial tiny variable which IDA created. And it's ok. void* [2] may be correct too, if you're sure that there were two arrays in v12 and v13, not one big array of 4 elements which is placed in both stack location. My experience tells me that it looks like one big array. Anyway you'll be able to delete the function and decompile again if you did some mistake. It's eternal learning :)",4/4/2018 13:21,,22324,CC BY-SA 3.0 +28109,17895,0,void* [4] combines all the variables. It is better than [2]. Should I have to do some trial and error?,4/4/2018 13:23,,23069,CC BY-SA 3.0 +28110,17895,1,"nope, it's all the alternative representations of the data, IDA doesn't care.",4/4/2018 13:27,,22324,CC BY-SA 3.0 +28111,17894,0,....but how exactly do I search for all string references? Do I need to install some specific software?,4/4/2018 16:49,,23869,CC BY-SA 3.0 +28113,17888,0,You may try this Strings tool from sysinternals: https://docs.microsoft.com/en-us/sysinternals/downloads/strings,4/4/2018 20:39,,23069,CC BY-SA 3.0 +28114,17888,0,"Thanks, but I have already found the location of the string within the executable file; I'm asking for a way to find the runtime memory address, since I think that is different from the byte offset in the actual file.",4/4/2018 21:07,,23869,CC BY-SA 3.0 +28117,17902,1,"Oops, I didn't know that there were an open source project! Thanks. Then I may start from that.",4/5/2018 8:09,,23870,CC BY-SA 3.0 +28118,17900,0,"Thanks for the explanation, but GetModuleHandle(0) + 0x981A0 didn't do it either.",4/5/2018 9:28,,23857,CC BY-SA 3.0 +28122,17900,1,"@TheElderScroller: use a debugger to see where it jumps and what happens, we can't do it for you.",4/5/2018 13:42,,60,CC BY-SA 3.0 +28123,17906,0,"Thanks Anton. I have learned a lot more in the 2 days since posting the question, and your answers confirm what I've learned so far. #2 is still a mystery to me, so thanks for the error code suggestion. Will check it out.",4/5/2018 15:44,,23851,CC BY-SA 3.0 +28124,17897,0,"Thanks. no problem with that, i know quite good how it works. I just didn't know at all of mutex before and wasn't sure of what to shearch for :).",4/5/2018 20:24,,23595,CC BY-SA 3.0 +28125,17901,0,"Apparently this only works with 32-bit executables, while the executable in question is 64-bit. (I tried loading it, it didn't work.) Probably should edit my question to clarify that. Is there an equivalent piece of software that works for 64-bit executables?",4/5/2018 21:42,,23869,CC BY-SA 3.0 +28126,4806,0,"Ida Free doesn't appear to [support plugins](https://reverseengineering.stackexchange.com/a/17640/23872) although there is [hope](https://github.com/yegord/snowman/issues/158), in the meantime Snowman might be better used as standalone.",4/6/2018 5:39,,23872,CC BY-SA 3.0 +28127,17640,1,"Nice to know. No explicit mention that on the [download page](https://www.hex-rays.com/products/ida/support/download_freeware.shtml), and nothing in the Help file under **Plugin modules**.",4/6/2018 5:46,,23872,CC BY-SA 3.0 +28129,17913,0,Thank you; now I have to revive that code and to post it somewhere.,4/6/2018 14:38,,18386,CC BY-SA 3.0 +28130,17904,0,"Thank you for looking - I believe it's (roughly) 5 times days since 1970-01-01, split into ASCII chars. The abnormalities you identified were my typos and I apologize.",4/6/2018 14:46,,23827,CC BY-SA 3.0 +28131,17914,0,This is exactly what I was looking for a high level run down of the differences. Thanks.,4/6/2018 16:33,,22669,CC BY-SA 3.0 +28133,17892,0,"I think your question is fine, but maybe split it in one about qpst, and another about extracting firmware.",4/7/2018 6:23,,1842,CC BY-SA 3.0 +28135,17918,0,I loved that game (still have it here somewhere)! You might start with this: http://1amstudios.com/projects/opennfs1/,4/7/2018 17:44,,3557,CC BY-SA 3.0 +28136,17923,2,"After posting I also found [this](https://msdn.microsoft.com/en-us/library/dn736986.aspx): +Windows on ARM executes in little-endian mode. Both the Visual C++ compiler and the Windows runtime expect little-endian data at all times. Although the SETEND instruction in the ARM instruction set architecture (ISA) allows even user-mode code to change the current endianness, doing so is discouraged because it's dangerous for an application. If an exception is generated in big-endian mode, the behavior is unpredictable and may lead to an application fault in user mode, or a bugcheck in kernel mode.",4/7/2018 20:49,,23588,CC BY-SA 3.0 +28139,17928,1,"I was not entirely convinced your question fits on this site (and – hah – I might even have referred you to [mathematics.se]), but on the other hand, as we already have coffee pads and license plates, this one should fit as well :) First thought: have you considered reverse-engineering the executable? If not, can you put up a download link so someone else might have a go at it? It *could* be easier than finding out the relationship between these numbers.",4/8/2018 19:47,,2959,CC BY-SA 3.0 +28140,17925,2,"https://syssec.mistakenot.net/papers/eurosp-2017.pdf, https://github.com/uxmal/nucleus, https://binary.ninja/2017/11/06/architecture-agnostic-function-detection-in-binaries.html",4/8/2018 22:03,,18317,CC BY-SA 3.0 +28141,17931,2,Mind to attach the corresponding opcodes? The hexbytes which represent the instructions.,4/9/2018 5:04,,18698,CC BY-SA 3.0 +28142,17931,0,Hopper reports that the instruction at 0x1000021e5 is encoded as `74 D9` @Megabeets . I see that this corresponds to a relative jump according to the intel reference. I'm guessing then that Hopper is just converting the relative jump into its equivalent for easy viewing?,4/9/2018 5:06,,23914,CC BY-SA 3.0 +28143,17904,0,"Can you add 6-10 consecutive dates that start at one month and end at another? +i.e. NOV 25 till DEC 05",4/9/2018 5:38,,23877,CC BY-SA 3.0 +28145,17925,0,"your keep adding edits which are basically answers to your question, so I'm not sure what other answers you are expecting...",4/9/2018 8:21,,60,CC BY-SA 3.0 +28146,17925,0,"Edit 1 is an additional (related) question. Edit 2 and 3 are possible solutions, but I explained why they don't fit my needs and I have added them because they could be useful for others having the same question but different specific needs.",4/9/2018 8:26,,23859,CC BY-SA 3.0 +28147,17930,0,"Did you try -B option ? (-B batch mode. IDA will generate .IDB and .ASM files automatically"")",4/9/2018 10:29,,2318,CC BY-SA 3.0 +28148,17928,0,"mathematically speaking you can always fit a curve with another. The results get better when you have a large set of values. In your case, the best way would be to track down the function doing the arithmetic.",4/9/2018 10:54,,14622,CC BY-SA 3.0 +28149,17939,0,I looking for recommend on some course you tried,4/9/2018 21:21,,23924,CC BY-SA 3.0 +28150,17939,0,"I've watched most videos from all of these resources, which is why I instantly recommended them.",4/9/2018 21:34,,20928,CC BY-SA 3.0 +28151,17942,3,Possible duplicate of [how to setup IDA pro linux server](https://reverseengineering.stackexchange.com/questions/11516/how-to-setup-ida-pro-linux-server),4/10/2018 6:32,,18698,CC BY-SA 3.0 +28153,17928,0,Can you tell us more about the physics of the game. Is it vertical motion (e.g. a rocket against gravity) or horizontal motion (e.g. a car against friction and air resistance)?,4/10/2018 8:04,,4731,CC BY-SA 3.0 +28154,17938,0,"did you tried googling? you're not even giving us what level you're interested in (entry, intermediate, advanced).",4/10/2018 8:17,,18014,CC BY-SA 3.0 +28155,17761,0,This is only part of the solution as the shift also divides CX by 2 which could be relevant in the following program flow.,4/10/2018 8:33,,1490,CC BY-SA 3.0 +28156,17938,0,Also be aware that those courses most likely will be in highly technical English – beyond your current level.,4/10/2018 9:54,,2959,CC BY-SA 3.0 +28157,17944,0,"The question I'm trying to answer is what would the original C code (if this was indeed C) could look like. It might as well be like your example, if you think a C compiler could take what you wrote and optimize it to look like my assembly code.",4/10/2018 10:50,,3302,CC BY-SA 3.0 +28158,17761,0,You are correct. That is what I was trying to say with “for simplicity without the changing of cx”.,4/10/2018 10:51,,23656,CC BY-SA 3.0 +28163,17940,1,maybe add a word of explanation why this one?,4/10/2018 12:59,,18014,CC BY-SA 3.0 +28166,17954,0,"that command line and it still does not work for me, can you help me? Thanks.",4/10/2018 16:33,,23943,CC BY-SA 3.0 +28168,17953,1,"Looks to me like you copied and pasted the content of another question. This is not how our community work. And next time, pay attention to the sentences you copy, you asked for the ""middle"" column but mentioned you want the mnemonics (lea, push,...) which in the right column",4/10/2018 16:37,,18698,CC BY-SA 3.0 +28169,17953,0,@Megabeets He is absolutely right ... I am working on a project and I need to find out how to do it. where I saw her would not let me ask.,4/10/2018 16:41,,23943,CC BY-SA 3.0 +28172,17954,1,Did you get any errors? What OS are you using?,4/10/2018 18:04,user22967,,CC BY-SA 3.0 +28174,17954,0,"There is something wrong in that sequence with the ""sed"". Windows 10.Did it work for you?",4/10/2018 19:06,,23943,CC BY-SA 3.0 +28178,17956,0,"ok, but how to know the address of the entry point to start disassembling? --start-address ??",4/10/2018 19:45,,23943,CC BY-SA 3.0 +28179,17956,0,"and the opcodes that are two words (lock in) in this way only ""lock"" is extracted?",4/10/2018 19:57,,23943,CC BY-SA 3.0 +28180,17954,0,"Yes, however I ran this on Linux (Debian 9 on x64) with GNU objdump (GNU Binutils for Debian) 2.28, sed (GNU sed) 4.4 and cut (GNU coreutils) 8.26. However, I don't think any of these options are exotic. Can you upload the output you get from objdump somewhere?",4/10/2018 21:26,user22967,,CC BY-SA 3.0 +28182,17954,0,@MichaelEngel just replace the single quote with double quote should work as is in windows,4/10/2018 22:32,,3473,CC BY-SA 3.0 +28184,17959,0,"I'll need to check the specific example again, but I think this code is done in multiple places in a loop, so the CX value is maintained and shifted until there is a 0 there, so I'd say yes, the value is reused. I'll reply back if it's not.",4/11/2018 1:33,,3302,CC BY-SA 3.0 +28185,17959,0,"@EduGarcia Either way, posting more of the code would help. It's hard to say what code may have compiled to that with such a small snippet.",4/11/2018 1:45,,23440,CC BY-SA 3.0 +28186,17960,0,No binary format handler is defined in the Linux kernel for PE binary files. As a result the kernel will not compose a process image in virtual memory from a PE binary. No process image means no debugging since there is nothing for ptrace to attach to. https://lwn.net/Articles/630727/,4/11/2018 3:42,,18317,CC BY-SA 3.0 +28189,17942,0,are you having problems using IDA's debugger? Please specify the exact issue you're having or what specific feature you're missing.,4/11/2018 7:39,,60,CC BY-SA 3.0 +28190,15405,0,"How was this hex file produced ? +Maybe this zero length type 0 record is in here to mess with those who try to make use of hex files they have no rights to.",4/10/2018 16:28,,23945,CC BY-SA 3.0 +28192,17953,1,"@WilberConcepciónLugo I edited the question, but please use your own words next time. Ask a friend to check your English if you're not sure.",4/11/2018 8:07,,60,CC BY-SA 3.0 +28206,17972,1,"yes, but we won't just do it for you. Describe what you tried and what difficulties you encountered.",4/12/2018 7:36,,60,CC BY-SA 3.0 +28208,17975,1,"Uhm... can you put a breakpoint after the original array is created, get the newly allocated memory address and put a R/W hardware breakpoint on it? I don't use OllyDbg, but I'm sure there must be some method to script it.",4/12/2018 7:57,,111,CC BY-SA 3.0 +28209,17971,0,"I didn't do it myself, but I think that you can either run IDA with -p option or fix cfg/ida.cfg file DEFAULT_PROCESSOR section.",4/12/2018 10:25,,2318,CC BY-SA 3.0 +28210,17980,2,write a bit more. Maybe add the command how to use it?,4/12/2018 12:53,,18014,CC BY-SA 3.0 +28211,17956,0,"I want to execute the same file yours disopt.txt, but in the argument ""--start-address"" is the address of the entry point ... objdump @disopt.txt c:\Windows\System32\calc.exe | awk ""{ if($2==\""lock\"") {print $2,$3} else print $2 }"" C:\>cat disopt.txt +-d +--no-show-raw-insn +--start-address ????",4/12/2018 14:15,,23943,CC BY-SA 3.0 +28212,17980,0,`flashrom` only handles SPI flash chips. it won't handle NAND flash or know how to extract embedded USB controller firmware.,4/12/2018 14:23,,60,CC BY-SA 3.0 +28213,17956,0,objdump -f bin shows the entry point use that as i already answered,4/12/2018 17:54,,3473,CC BY-SA 3.0 +28216,17928,0,"Just understand that depending on how realistic the game is, there are other (hidden) parts of the calculation. For example, there is opposing aerodynamic drag in real life, which IIRC increases with the square of the velocity (e.g. 4x as much drag at 10 mph compared to 20 mph). Aero drag would be part of the speed calculation, counteracting the thrust force, but it's not linear (obviously). RE'ing the binary (as others have said) is the best. If not, try accounting for the aero drag, and you might get close.",4/13/2018 1:37,,22864,CC BY-SA 3.0 +28217,17975,0,"If you know where the alloc is and are using windbg you can provide a command to run when a breakpoint gets hit. So you can break on wherever the allocation return is and use the command to set a second breakpoint. e.g.: bp ""ba w 4 "". You can do something similar with conditional breakpoints in Olly",4/13/2018 4:51,,1306,CC BY-SA 3.0 +28218,17972,0,Try http://jsnice.org/. I tried it. It looks like a js bot to view pages at https://adbtc.top/,4/13/2018 5:23,,14622,CC BY-SA 3.0 +28222,17710,2,@PsyCode can you post your solution in an answer?,4/13/2018 7:03,,60,CC BY-SA 3.0 +28225,17985,0,"this is not a forum, please don't post comments or follow-up questions in the answer box.",4/13/2018 9:41,,60,CC BY-SA 3.0 +28226,17985,2,"BTW, `sslstrip` does not ""decrypt"" anything.",4/13/2018 9:42,,60,CC BY-SA 3.0 +28229,17873,1,"It might be helpful to know that a CString is a struct with a single pointer in it (it points to the string directly, but in front of it there is extra data). The decompiler doesn’t deal with this nicely at all. Defining the struct can be done but you won’t get much better output other than better CString in front of the casts.",4/13/2018 10:48,,2221,CC BY-SA 3.0 +28230,17873,3,Oh and I think V7 is used for exception handling (detection of which state the program is in). I’ll write a full answer later.,4/13/2018 10:49,,2221,CC BY-SA 3.0 +28231,17982,0,Where is the firmware from and what device is it for?,4/13/2018 13:56,,18317,CC BY-SA 3.0 +28233,17990,0,"Not as easy to use IMHO, but this site provides a web interface to the keystone/capstone assembler and disassembler libraries: http://shell-storm.org/online/Online-Assembler-and-Disassembler/",4/13/2018 16:01,user22967,,CC BY-SA 3.0 +28236,17941,0,https://reverseengineering.stackexchange.com/questions/2252/what-is-dll-injection-and-how-is-it-used-for-reversing/2255#2255,4/13/2018 16:39,,18317,CC BY-SA 3.0 +28239,17828,0,ASLR is fully supported by x64dbg and is not the problem the op is having...,4/14/2018 9:00,,2221,CC BY-SA 3.0 +28240,17828,0,@mrexodia thanks the op didnt comeback so i do not know what was the problem i just suggested ASLR as a possible cause to eliminate if x64 supports ASLR fully then i guess the problem lies elsewhere,4/14/2018 9:17,,3473,CC BY-SA 3.0 +28241,17994,0,"You opened the executable and so you are seeing the executable code contents. It sounds like you were expecting *source code* there. Are you aware of the difference? (A ""no"" answer would indicate you'd need far more information than can be provided in an answer – it's practically an IT course on its own.)",4/14/2018 12:18,,2959,CC BY-SA 3.0 +28242,17994,0,"Have you tried to simply kill and restart the RemoteCameraControl process automatically, e.g. once per day? This should be possible using AppleScript, see http://macstuff.beachdogs.org/blog/?p=31",4/14/2018 13:59,user22967,,CC BY-SA 3.0 +28244,17995,1,It is difficult to understand this.,4/14/2018 22:17,,18317,CC BY-SA 3.0 +28245,17995,0,I don't understand the trampoline function. But I know little about hooking with Easyhook. Link: https://easyhook.github.io/,4/15/2018 6:29,,23069,CC BY-SA 3.0 +28252,17979,0,"I not get you, how can I put on `cfg/ida.cfg` that default processot will be arm ?",4/15/2018 15:41,,23685,CC BY-SA 3.0 +28253,17979,0,See updated answer,4/15/2018 15:56,,2318,CC BY-SA 3.0 +28255,18001,0,how can I do it on windows please?,4/15/2018 16:02,,23685,CC BY-SA 3.0 +28256,18001,0,"@ivn23744sawoe.com it technically can be done but it is experimental (refer to https://radare.gitbooks.io/radare2book/content/introduction/windows_compilation.html) however, I highly suggest using cygwin or something similar to get the best out of it (I believe also listed in the link above. Also, this question may be too broad or subjective I'd suggest limiting the scope for ""offline windows command line tool' or something similar to improve it's quality.",4/15/2018 16:03,,22915,CC BY-SA 3.0 +28259,18001,0,"so you not recommend use radare2 on wondows? I once download from https://rada.re/r/ ... do you only recommend use on Linux and install with `sudo apt-get install radare2` and then translate with `rasm2 -a arm -b 32 add R0, R1, R2` ??",4/15/2018 16:12,,23685,CC BY-SA 3.0 +28260,18001,0,"@ivn23744sawoe.com In general, if you have a Debian distro then yes, I suggest using it. If not you can get a similar result using Cygwin (https://cygwin.com/) on windows and installing radare2 on it (or on a VM).",4/15/2018 16:16,,22915,CC BY-SA 3.0 +28261,18001,0,"I can use Ubuntu . are you sure that `sudo apt-get install radare2` need to install all I need to run `rasm2 -a arm -b 32 add R0, R1, R2` ? I not meat and use Cygwin , can't I just install radare2 on windows without Cygwin ?",4/15/2018 16:22,,23685,CC BY-SA 3.0 +28262,18001,2,"@ivn23744sawoe.com Yes it works on Ubuntu as you said. It can also work on windows as stated in the documentation earlier. Please try the methods yourself and see what works for you instead of positing it as a comment here. Still this is a Q&A site, not a technical support forum :)",4/15/2018 16:25,,22915,CC BY-SA 3.0 +28263,17979,0,"I wasn't so clear , there is some arm that I can select when I open ida (little/big indiand and more of that) where I can see all the list of processor that I can write on ` ""*""`",4/15/2018 16:56,,23685,CC BY-SA 3.0 +28264,17979,0,https://www.hex-rays.com/products/ida/support/idadoc/618.shtml,4/15/2018 17:23,,2318,CC BY-SA 3.0 +28265,18001,1,"@ op rasm2 works on windows @ElianKamal you need to add quotes iirc 80e0 corresponds to add r0, r0 , r0 not what you want you need to get back 02008e01",4/15/2018 19:29,,3473,CC BY-SA 3.0 +28266,18002,0,"I have little misunderstanding, and will happy if you can help me , . I want the simple way to get each time the hex for 1 arm instruction . `1)how can I install rasm2 n windows that I can run `rasm2 -a arm -b 32 ""add r0, r1, r2""` 2) what is the different between keystone and keypatch? thank you",4/15/2018 20:19,,23685,CC BY-SA 3.0 +28268,18002,0,what is the problem with installing double click the installer is all that is needed :( http://radare.mikelloc.com/get/2.3.0/radare2_installer-msvc_32-2.3.0.exe i dont know what keypatch is it is for ida and i havent used it keystone can be installed with pip install keystone,4/15/2018 20:26,,3473,CC BY-SA 3.0 +28276,18004,0,Why not just use Capstone?,4/16/2018 4:09,,18317,CC BY-SA 3.0 +28277,18004,1,"yeah use rasm2 -a arch -b bits -d ""bytes""",4/16/2018 4:24,,3473,CC BY-SA 3.0 +28278,18005,0,"very cool, thanks! follow-up: https://reverseengineering.stackexchange.com/q/18007/22669",4/16/2018 4:51,,22669,CC BY-SA 3.0 +28279,18008,0,"that's interesting. I could see it happening the other way around, but I wonder how the 32 bit opcode got translated into the same 64bit opcode with the RIP operand (for free).",4/16/2018 5:03,,22669,CC BY-SA 3.0 +28280,18008,0,"Added explanation for the reason behind. Again, simply the shift from 32bit to 64bit",4/16/2018 5:21,,18698,CC BY-SA 3.0 +28281,17901,0,"There is x64dbg thwt works on windowsx64. Olydbg does have a x64 version , but Oleh isn't really active in it's development , so It's sort of in a dead state.",4/16/2018 7:04,,6992,CC BY-SA 3.0 +28282,18008,1,"@EvanCarroll - if you've been doing this for long enough to be familiar with it, it's similar to the way going from 16-bit code to 32-bit changed all your 'ax' (etc) references to 'eax': in each mode there are default settings that are designed to be sensible *for that mode*, which cause slight changes in the interpretation of each instruction.",4/16/2018 8:09,,24024,CC BY-SA 3.0 +28283,16362,0,"I ""guess"" he's asking for help to cheat in a local game. If he is asking for help to cheat in on-line games using a profile with his, supposedly, full name and picture of him... Well, in that case, he is not bright.",4/16/2018 9:22,,111,CC BY-SA 3.0 +28284,17994,0,"@usr2564301: Yes I'm aware of the difference, and the fact that the source code is inherently lost during compilation into the executable file. But I did think I would be able to find (and change) the specified parameter for such variables as ""Timeout"" and ""resetTimeoutTimer"" in the executable?",4/16/2018 9:52,,24009,CC BY-SA 3.0 +28285,18012,0,"The protocol you would use here is called JTAG, which I'm assuming your Bus Pirate will be able to handle. I don't have experience with this particular microcontroller, but if I were you I'd look into OpenOCD as a tool.",4/16/2018 9:54,,17073,CC BY-SA 3.0 +28286,17994,0,"@MichaelEngel: Good idea. I did already create a .plist with `KeepAlive` and added it to LaunchAgents, but the program does a lot of back talk when it crashes and restart, prompting dialogs both on quit and start (already set `defaults write com.apple.CrashReporter DialogType none` but it happily adds dialogs of its own about folder location to save files, etc.). The tricky thing with your solution is that I need to be sure it isn't in the middle of taking photographs (and the trigger for the photograph is something completely outside of the program)...",4/16/2018 10:12,,24009,CC BY-SA 3.0 +28287,17995,1,check rewolf opensource virtualizer https://github.com/rwfpl/rewolf-x86-virtualizer,4/16/2018 11:32,,3473,CC BY-SA 3.0 +28288,17995,0,"Ohh thanks, that's exactly what i need. Found, std::vector> scanForMarkers(BYTE *data, DWORD length) and other usefull things. ;)",4/16/2018 11:42,,23751,CC BY-SA 3.0 +28289,17995,0,"@HappyDay: please post answers in the answer box, don't add them into the question body or comments. but make sure it's an actual answer and not just ""something that looks like it"".",4/16/2018 13:30,,60,CC BY-SA 3.0 +28296,18014,2,"You're wanting to access the key from java, right? In that case, one easy way to circumvent it would be to attach a debugger and grab the key once you've called the method to retrieve it.",4/16/2018 18:00,,8063,CC BY-SA 3.0 +28297,18014,0,The practice of hard coding cryptographic keys has its own CWE entry: https://cwe.mitre.org/data/definitions/321.html,4/16/2018 18:04,,18317,CC BY-SA 3.0 +28298,18014,0,how about doing all of the decryption and other stuff in the C code?,4/16/2018 18:27,,24036,CC BY-SA 3.0 +28299,18012,0,@felixphew: please use the answer box for answers. comments should be used to ask for clarification or to point out problems in the post.,4/16/2018 20:16,,60,CC BY-SA 3.0 +28300,18012,0,"@IgorSkochinsky I didn’t feel that qualified as an answer, more as advice to OP on where to look (it doesn’t really answer the question) hence I hesitated to post it as an answer.",4/16/2018 20:18,,17073,CC BY-SA 3.0 +28301,18012,0,"even an incomplete answer is better than a comment which is not a comment, and it can be improved later. Please read https://reverseengineering.stackexchange.com/help/privileges/comment",4/16/2018 20:23,,60,CC BY-SA 3.0 +28304,18008,0,"@EvanCarroll: 32-bit x86 has 2 redundant ways to encode `[disp32]` (with no registers): with and without a SIB. x86-64 repurposed the without-SIB version to mean `[RIP + rel32]`, leaving the longer with-SIB version to still mean `[sign_extended_disp32]` like when you use a disp32 with GP registers. In NASM syntax, `[rel foo]` vs. `[abs foo]`, or use `default rel`.",4/17/2018 4:57,,13014,CC BY-SA 3.0 +28305,18008,0,"@Megabeets: Only the special `mov al/ax/eax/rax, moffs` form of `mov` (and the store form) use a full 64-bit / 8-byte absolute address. There are no ModR/M addressing modes that can be used with other instructions that accept more than an absolute disp32. So your last sentence could say that there aren't any normal addressing modes. Actually that's a little weird. *normally*, you just use small offsets relative to an address in registers, like `[rdi + 8]`, *or* RIP-relative. But yeah in position-dependent code you can index a static array with `[array + rdi]`.",4/17/2018 5:04,,13014,CC BY-SA 3.0 +28306,18014,2,"your ""pretty darn secure"" is trivially broken for most seasoned reverse engineers.",4/17/2018 5:19,,14622,CC BY-SA 3.0 +28307,18022,1,care to explain what does this option do? I'm assuming it does not control if the jump lines/arrows are displayed as those you have in x64dbg too.,4/17/2018 9:21,,18014,CC BY-SA 3.0 +28310,18023,0,Is there any way to click on the command and see on the left if there is a jump path to it from an instruction out of current view? Or is xanalyze the way to go? Thanks a lot and I truly appreciate the work you've put in to making the program.,4/17/2018 13:51,,22004,CC BY-SA 3.0 +28311,18024,0,`rasm2 -v` gives what? are you using the latest version?,4/17/2018 15:43,,18014,CC BY-SA 3.0 +28312,18024,0,@PawełŁukasik `rasm2 2.6.0-git 1 @ windows-x86-64 git.` I'm pretty sure it's the latest version.,4/17/2018 15:52,,11482,CC BY-SA 3.0 +28313,18024,0,I'm running the first two commands and have the same output (on Ubuntu though). I'll check windows later,4/17/2018 15:55,,18014,CC BY-SA 3.0 +28314,18023,0,"No, the view on the left is a clone of IDA. With xrefs it would be possible to show arrows coming from higher up, but it would make everything too crowded probably...",4/17/2018 17:48,,2221,CC BY-SA 3.0 +28315,18026,0,"Yes, I found that with Google. However, most of the time when I use Google and Radare together, I find out later that I'm simply not using Radare right. I'll even upvote you -- Clearly I can open the Intel manual though. I half expect there to be a visual command that tells me what they all mean though.",4/17/2018 21:03,,22669,CC BY-SA 3.0 +28317,18026,0,radare can tell what which flag means,4/17/2018 22:22,,3473,CC BY-SA 3.0 +28318,18026,0,"`dr` doesn't show me that, it just shows `rflags = 0x00000200`",4/17/2018 22:25,,22669,CC BY-SA 3.0 +28319,18026,0,it is dr= not plain dr dr= shows it in column and interpretes the flag values,4/17/2018 22:27,,3473,CC BY-SA 3.0 +28323,18033,0,It is possible untill the executable is not obfuscated.,4/19/2018 7:53,,23069,CC BY-SA 3.0 +28324,18033,0,"@Biswapriyo It's not. I have compiled it, but I am missing some of the original classes and I have 95% of the original source. I Already have decompiled it with DotPeek, but I would like to have a more readable code instead of the IL/C# generated because it will speed up my reconstruction work a lot. + +It it's possible, then how to?",4/19/2018 7:56,,24083,CC BY-SA 3.0 +28325,18033,0,what is this 5% missing? Maybe the code was removed from the exe as it was not used? Can you provide the binaries?,4/19/2018 8:18,,18014,CC BY-SA 3.0 +28327,18035,0,"the only way is through disassembling. IDA may recognize the arguments count automatically, but the types of the arguments are up to you to reverse engineer. Also pay attention to the fact that COM methods pass the pointer to _this_ as stack argument, not via ECX. I.e. first argument in COM methods is always _this_.",4/19/2018 8:29,,22324,CC BY-SA 3.0 +28329,18033,0,"@PawełŁukasik Cannot provide the binary as it's my client project. The code missing is due to GIT misbehavior so it's just a data loss. The full code, with 100% of the classes is compiled tough and I would like to retrieve the code from there.",4/19/2018 9:19,,24083,CC BY-SA 3.0 +28330,18036,0,How I can do that? I Don't need comments and other things.,4/19/2018 9:19,,24083,CC BY-SA 3.0 +28331,18033,2,"you can't retrieve the original code as you wrote it, you can get sth that behaves the same but might look different. A lot of code that is written is just a syntactic sugar and look completely different when compiled",4/19/2018 10:15,,18014,CC BY-SA 3.0 +28336,18042,3,"I can't believe I didn't know this until now, thanks in advance!",4/20/2018 5:59,user24091,,CC BY-SA 3.0 +28337,18024,0,@PawełŁukasik Any luck figuring it out? Also is there any alternative command line assembler/disassembler to rasm2? GUI versions are welcomed as well. My only purpose is to easily assemble/disassemble my subroutines on the fly without all the hustle that other apps is making.,4/20/2018 7:30,,11482,CC BY-SA 3.0 +28341,18033,0,"@PawełŁukasik Well, I've tried :P +I imagined that it was impossible to recover original code from IL code, but hoped somehow PDB could help in the process.",4/20/2018 12:19,,24083,CC BY-SA 3.0 +28343,18042,2,There is a registry change during this selection `HKCU\Software\Hex-Rays\StrWinStringTypes -- REG_BINARY -- 00 01 02`,4/20/2018 15:50,,23069,CC BY-SA 3.0 +28347,18024,0,"sorry, didn't have enough time, but I can see you've opened a issue on GitHub - I would probably do the same.",4/20/2018 19:14,,18014,CC BY-SA 3.0 +28348,18024,1,I've asked core developers -- it's known issue. Probably will be resolved soon.,4/20/2018 19:25,,12810,CC BY-SA 3.0 +28350,18049,0,Edited question to clarify what I am asking. Does that make my question clearer?,4/20/2018 20:30,,24090,CC BY-SA 3.0 +28351,18050,0,It might be useful if you annotated the fields you already decoded in the packet dumps.,4/20/2018 20:30,user22967,,CC BY-SA 3.0 +28352,18049,0,@DarienSpringer It does not.,4/20/2018 20:36,,18317,CC BY-SA 3.0 +28353,18049,0,What is not clear?,4/20/2018 20:36,,24090,CC BY-SA 3.0 +28354,18049,0,"@DarienSpringer The statement ""Does the stack directly transfer data from memory to the child process of the shell when a function is called to access some data in memory to print or return it to the console output? "" - Each process has its own stack space, so this does not make sense. Did you read anything I wrote?",4/20/2018 20:38,,18317,CC BY-SA 3.0 +28355,18050,0,"Done! As i mentioned, it's not consistent. I can see values in some packets, but maybe it is coincidence and i'm reading it wrong.",4/20/2018 20:49,,24099,CC BY-SA 3.0 +28356,18049,0,"Yes, I did read what you said. I have clarified my question.",4/21/2018 1:05,,24090,CC BY-SA 3.0 +28357,18049,0,You need to familiarize yourself with the fundamental concepts of computer architecture and the Linux file I/O model. Doing so will address any of the misunderstandings you may currently have.,4/21/2018 4:01,,18317,CC BY-SA 3.0 +28359,18049,0,Ok. Thank you for being willing to answer my question even though it is clear to me that I don't even know enough to ask the question I wanted to ask.,4/21/2018 4:41,,24090,CC BY-SA 3.0 +28363,18049,0,"@DarienSpringer Don't worry, everyone starts at 0. I'm sure you will be able to answer the question you have in mind on your own soon enough.",4/21/2018 22:43,,18317,CC BY-SA 3.0 +28365,16984,0,"Hey @Megabeets , sorry for not having marked it by the way I figured this out a long time ago but it's actually virtualized software which detects if there's a debugger from input output 5658, I'll mark it",4/22/2018 0:03,,22599,CC BY-SA 3.0 +28367,18048,0,"I had one more thing in mind, pointers do not change on any updates, is that true?",4/22/2018 7:16,,11482,CC BY-SA 3.0 +28368,18058,1,Good point. Can you please elaborate on how could they implement such anti-cheat. Are they calculating the executable hash and then check it on run time? Because I had a trouble once on finding the anti cheat function in a game which they was banning players who modify any bytes in the executable.,4/22/2018 7:21,,11482,CC BY-SA 3.0 +28369,18063,0,As far as I remember there was save_user_lvar_settings for hex rays variables in ida 6.8. I'd suggest to search this function on github - this will probably give you some examples.,4/22/2018 10:06,,2318,CC BY-SA 3.0 +28370,18063,0,"@ws seems a common problem ? the thing is that when i'm trying to use user_lvar_visitor_t ulv;( instead of old lvar_uservec_t lvinf; ) i get error that can't create example of abstract class . And i can't find any valid source, can u point me to correct sources ?",4/22/2018 11:53,,14279,CC BY-SA 3.0 +28371,11634,1,but what if i want to store them ?,4/22/2018 12:24,,14279,CC BY-SA 3.0 +28372,18063,0,Unfortunately the only source I know about that should work is related to IDA 7.1 and resides here :https://github.com/IDArlingTeam/IDArling/blob/master/idarling/core/events.py,4/22/2018 12:55,,2318,CC BY-SA 3.0 +28373,18063,0,"@ws and that's for python ? i can't make lvinf = ida_hexrays.lvar_uservec_t() the same in C++ ; Also i have found this function - bool __fastcall hexapi rename_lvar(lvar_t *v, const char *name, bool is_user_name); in comments it says //This function permanently renames a local variable. , but how to access it ? i get error not found when i try to use it",4/22/2018 13:06,,14279,CC BY-SA 3.0 +28374,18063,0,"@ws huh finnaly after 2 days of searching, thx to these https://github.com/REhints/HexRaysCodeXplorer/blob/0b8a1c3157341e6612ccf5f6f28b18d9637a96e7/src/HexRaysCodeXplorer/CodeXplorer.cpp guys ! the solutions i to get pointer from pseudo code, and apply vu.rename_lvar(&lvars.at(i), ""var_permaNamed"", true); Ands thats it! it renames permamently, thanks anyway ,",4/22/2018 13:45,,14279,CC BY-SA 3.0 +28375,11539,0,"For the sample data given, is each reading given in the order it was received? Can you provide some approximate timestamp information?",4/22/2018 14:17,,3557,CC BY-SA 3.0 +28376,18048,0,"That's what I addressed in point 6 above. Pointers are as liable to change as anything else, depending on the update. But depending on the time spent on researching any given game, you may find that pointers for something will persist across updates. You really don't know what the case will be until you dig in (or, as can be the case, you pick an approach and hope for the best, then deal with whatever you might have to if the cheat breaks later).",4/22/2018 15:44,,20928,CC BY-SA 3.0 +28377,18058,1,"Good addition, COB RCE. To add to this, some programs also check the values in memory addresses for any modifications, so pointers won't necessarily work, either (this is very game-dependent, so you learn what you're up against as you dive in). Two games I hacked recently had some fun anti-cheat implementations that watched for value modifications in addresses, as well as modifications to game code (like Dark Souls 3, which cyclically scans code and restores any modified bytes). In those two games, one would insta-kill your character if you modified a value, and the other would close the game.",4/22/2018 15:49,,20928,CC BY-SA 3.0 +28378,18048,1,"Sorry I just noticed that you edited the post, I have read your post earlier but didn't have time to comment.Thank you for contributing!",4/22/2018 15:49,,11482,CC BY-SA 3.0 +28379,18058,0,@dsasmblr Did you get around it and make your cheats work somehow?,4/22/2018 15:55,,11482,CC BY-SA 3.0 +28380,18058,0,"Regarding your question, 0x00, your guess is as good as any. There are many, many tricks used in anti-cheat. A great way to learn and familiarize yourself with many of them is to spend time in communities like MPGH and UnknownCheats (Google them), and put what you learn into practice. Depending on what your targets tend to be, it can get expensive. Expect to be banned and then have to purchase the game again. As for your second question, yes, I got around them. They were fun challenges. Give them a try sometime: Caveblazers and UnEpic are the two games. Try modifying gold in each game... =)",4/22/2018 15:58,,20928,CC BY-SA 3.0 +28386,18058,0,"I guess every protection has its own implementation, the ones that come to my mind (not specific to games though) are VMProtect and Themida, the first one says that it secures not writable sections before OEP is reached, the second one talked about CRC and didn't precise its scope, as @dsasmblr said it should be a cyclic scan that checks the code and restores/crashes the game (if the game is packed there's no way to restore the modified bytes because they are calculated at runtime so its probably done by checking some CRC and crash in case of failure)",4/22/2018 19:53,,24110,CC BY-SA 3.0 +28389,18065,1,You've to provide that error as your question doesn't make sense without that information ;) possible cause: file is an installer. Obfuscated .net etc.,4/22/2018 20:51,,23069,CC BY-SA 3.0 +28391,18035,1,"each pointer in vtable points to the function code, which you need to disasseble. One by one.",4/23/2018 7:33,,22324,CC BY-SA 3.0 +28392,18063,0,"@ws , but one more question, maybe u know how to convert carg_t &a = args[i]( carglist_t &args = *expr->a; ) ; to a lvar_t* , or how to get position to it ? i got special symbols and some arithmetic calculations with variable , and can't use it name fully, what is the best option to get to lvar_t ?",4/23/2018 11:04,,14279,CC BY-SA 3.0 +28393,18063,0,I wish it knew ...,4/23/2018 11:17,,2318,CC BY-SA 3.0 +28394,11539,1,I would suggest learning the chip used in your TPMS. And then read about it's protocol in the datasheet. For example in NXP they transfer pressure and temperature. http://cache.freescale.com/files/training/doc/dwf/DWF14_TechDay_CN_Baoding_SEP_25_007.pdf see page 40,4/23/2018 12:23,,22324,CC BY-SA 3.0 +28402,18063,0,"please avoid extended discussion in comments. If you have another question, make another post (link to this one if needed for context). If you found an answer, please post it in the answer box so others are aware of the solution. Thank you.",4/23/2018 21:01,,60,CC BY-SA 3.0 +28403,18063,0,"P.S. if your question is about decompiler and not IDA itself, mention it next time. Also, SDK is C++ but you seem to be using Python which sometimes needs different approach, so make better titles",4/23/2018 21:04,,60,CC BY-SA 3.0 +28406,14951,1,"The code looks a little ugly but you do have it in source form. Why not profile a few runs and try to speed it up as-is instead of trying to find another algorithm which might look similar but produce slightly different results, breaking the protocol?",4/23/2018 21:21,,60,CC BY-SA 3.0 +28410,3076,1,"It is indeed possible to find wcb. For my particular old dos .exe it however says I need dll files, which I don't have.",4/24/2018 4:33,,24129,CC BY-SA 3.0 +28416,18068,0,"Dotpeek or similar gives you the clear optimized code. There's no doubt about it. My idea was how to retrieve the original code as close as possible to the real original source. + +i.e: + +Dotpeek retrieve all the loops and conditions optimized and scrambled in a better way, but I want them back in a readable way.",4/24/2018 14:20,,24083,CC BY-SA 3.0 +28417,18079,0,Please tell a bit more about your executable and environment. OS ? Processor ? In which OS are you running IDA ?,4/24/2018 14:50,,2318,CC BY-SA 3.0 +28418,18079,0,"WIndows XP in a Virtual Machine. Processor, AMD Phenom II X6 1055T I think...",4/24/2018 15:07,,24135,CC BY-SA 3.0 +28419,18079,0,And what about executable you’re trying to debug ?,4/24/2018 15:08,,2318,CC BY-SA 3.0 +28420,18079,0,"An .exe with simple code: #include +int main() +{ +//Este programa realiza la suma simple de dos números enteros +printf(""Sumando dos enteros\n""); +int suma = 2 + 3; +printf(""%i"",suma); +return 0; +}",4/24/2018 15:09,,24135,CC BY-SA 3.0 +28421,18068,0,"In my experience, I noticed that dnSpy gives the most readable decompiled code, and if the code flow is obfuscated (you still notice that the code of every method is similar to a finite state machine) use de4dot or some specific deobfuscator (de4dot can also detect the protection), decompile it again and check",4/24/2018 16:40,,24110,CC BY-SA 3.0 +28424,18071,0,"I created the program using LoadLibrary and GetProcAddress. I passed this struct as the argument, but the program was crashing. + +I used the following post as reference to create the program. +[MSDN: Using Run-time Dynamic Linking](https://msdn.microsoft.com/en-us/library/ms686944.aspx) @igor",4/24/2018 16:58,,24123,CC BY-SA 3.0 +28425,18071,0,"I can share more details of the program and the dll, if required",4/24/2018 17:00,,24123,CC BY-SA 3.0 +28426,18082,0,"Is the 4.9 version. And I don't open the project doing neither of those options (Doesn't even shows the Star Process one). The project doesn't want to open win the VM, it says that there is an instruction that isn't allowed. I made the executable in Lubuntu, where it worked fine.",4/24/2018 17:28,,24135,CC BY-SA 3.0 +28427,18071,0,add the source of how exactly you call it,4/24/2018 17:46,,60,CC BY-SA 3.0 +28428,18082,1,you made it in lububtu with gcc so it is elf ? and you are trying to debug it in windows ?? which is PE no that wont work,4/24/2018 18:18,,3473,CC BY-SA 3.0 +28429,18082,0,"Then how I am suposed to do it? Because in theory, gcc was supossed to work (As it is what the project said)",4/24/2018 19:17,,24135,CC BY-SA 3.0 +28430,18082,0,"@TheFerydra compile under windows, to create PE, or, I think, use remote debugging that IDA should support (but not sure if 4.9 does that)",4/24/2018 19:19,,18014,CC BY-SA 3.0 +28431,18088,2,Entry point is where the execution starts,4/25/2018 5:23,,18014,CC BY-SA 3.0 +28432,18086,0,"what exactly is ""snarfing""? Some references might help.",4/25/2018 7:17,,60,CC BY-SA 3.0 +28434,18092,0,"""The entry point isn't the address where you starts analyzing.."" Although this is true EOP **is** a good starting point for the analysis :)",4/25/2018 8:53,,18014,CC BY-SA 3.0 +28435,18092,1,haha good point :),4/25/2018 9:04,,18698,CC BY-SA 3.0 +28436,18086,0,"Snarfing means eating fast with great appetite ... Totally, out of context here. Maybe @vrickson meant sniffing or extracting.",4/25/2018 10:09,,4437,CC BY-SA 3.0 +28437,18052,0,"Thank you for the book link, I ordered it, will be educational or maybe more, describes the code",4/25/2018 15:05,,19647,CC BY-SA 3.0 +28439,18090,1,"Wow, thanks this is everything I wanted and much much more. Thanks again!",4/25/2018 16:04,,24097,CC BY-SA 3.0 +28441,18071,0,"added the source code. added the exe, dll and input files also.",4/25/2018 17:35,,24123,CC BY-SA 3.0 +28442,18071,0,you should pass the struct by pointer. `struct PARAMS1*`.,4/25/2018 18:02,,60,CC BY-SA 3.0 +28445,18100,1,show the full disassembly for the function.,4/25/2018 21:14,,18317,CC BY-SA 3.0 +28447,18071,0,Passing the struct by pointer in the code solved the problem and the code is working perfectly. thank you for your help.,4/25/2018 21:53,,24123,CC BY-SA 3.0 +28448,17756,0,Thank you for this explanation! I know I'm late on the response+accepting the answer so apologies for that. I've learned a lot since I posted this question and your answer makes complete sense now. It seems overwhelming at first but once you get used to reading it it's not so bad!,4/25/2018 23:01,,23692,CC BY-SA 3.0 +28449,18063,0,"@IgorSkochinsky actually i'm using both, idk if i should post solutions ? its rly simple, just no documentation on it.",4/26/2018 0:09,,14279,CC BY-SA 3.0 +28451,9413,0,"Please take a look a [link](http://www.atomigy.com/blog/?p=227), it should help in your reverse engineering",4/16/2018 23:15,,24040,CC BY-SA 3.0 +28452,11794,0,"Please take a look a [link](http://www.atomigy.com/blog/?p=227), it should help in your reverse engineering",4/16/2018 23:18,,24040,CC BY-SA 3.0 +28454,12455,0,It's also only x86...,4/26/2018 13:53,,24175,CC BY-SA 3.0 +28455,18105,0,"Thank you! This is a great explanation. I see my mistake - that I didn't recognize that this code was actually setting up pointers to specific characters in the input string. I should have recognized it, given that a similar operation happens earlier in the code. Basic question - how did you recognize that the loop was dealing with a pointer to a specific character in the string, specifically the line `add eax, edx` - instances like that are hard for me to recognize coming from higher level languages with more defined data types. Thanks again!",4/26/2018 15:27,,24160,CC BY-SA 3.0 +28456,18104,0,Wonderful! And thank you for running through it in windbg. Much appreciated.,4/26/2018 15:29,,24160,CC BY-SA 3.0 +28458,18105,1,"You are welcome! The key to recognize the pointer is at address 80486ea. There you load the content of the value stored at eax into edx. Thus, eax must be an address. The fact that the code deals with characters can be guessed from the fact that dl and al are compared. Characters usually have one-byte length (at least ASCII characters).",4/26/2018 20:10,,12800,CC BY-SA 3.0 +28459,18115,0,Is the binary packed with UPX or some variant thereof? How do you know it is malware? What is the SHA1-sum of the binary? Where did you get it from? Is the binary statically linked or dynamically linked? Is there a section header table present? What is the target architecture of the binary? No symbol table means no function names. https://syssec.mistakenot.net/papers/eurosp-2017.pdf,4/26/2018 21:42,,18317,CC BY-SA 3.0 +28460,18115,0,which disassembler are you using?,4/27/2018 7:06,,60,CC BY-SA 3.0 +28464,18115,0,"Using radare2, it's a 32 bit elf of mirai from virusshare for arm. Pretty sure it's statically linked",4/27/2018 19:58,,24178,CC BY-SA 3.0 +28466,18120,0,"How does it work? I saw when I tried to debug with ida I go to `int 3` ,is there any function that call to int 3 ? This int 3 it 1 byte, how can I replace it with nop?",4/28/2018 17:25,,23993,CC BY-SA 3.0 +28467,18120,0,`nop` is also one byte - `0x90`,4/28/2018 18:48,,18014,CC BY-SA 3.0 +28468,18120,0,Can you please explain me how it works? The anti debugger add to code `int3` soveach time I attach to process I came to `int 3`? Why? And if I just replace with hex editor the `int3` with `nop` the anti debugger will not catch me?,4/28/2018 20:09,,23993,CC BY-SA 3.0 +28470,18120,0,I think you need to understand how this anti-debugging works in the first płace,4/29/2018 6:25,,18014,CC BY-SA 3.0 +28472,18126,2,"Please don't take it as a legal advise, IANAL. https://www.eff.org/issues/coders/reverse-engineering-faq . It has some links and case names inside. Anyway, for any law related issue please, for your own safety, ask lawyer: in some countries these conversations with lawyer are protected by the corresponding privilege and can not be used against you.",4/29/2018 14:22,,2318,CC BY-SA 3.0 +28473,18125,0,"Do you conclude the `HWND` handle to be 0 just from Immunity not showing its value at the call site? Judging from the code this is inside a window proc and I do not see a way for the passed `HWND` handle to be NULL there, `GetDlgItemTextA` would fail in that case anyway. Have you checked `[ebp+8]` manually?",4/29/2018 14:53,,23277,CC BY-SA 3.0 +28475,18039,0,"what's an ""output sink""?",4/29/2018 15:55,,60,CC BY-SA 3.0 +28476,18125,0,"Thanks for your answer! , i am veryyy new with debugging.... , i have to thought that are a NULL , because HWND have neither value.... i am not a student from IT , can you please tell me , how does to check [ebp+8] manually ?",4/29/2018 15:57,,24197,CC BY-SA 3.0 +28477,18039,0,"BTW, please try to avoid editing questions in a way that invalidates existing answers.",4/29/2018 15:58,,60,CC BY-SA 3.0 +28478,18124,0,how did you determine that the application does not load the plist from that location and that it did before?,4/29/2018 16:02,,60,CC BY-SA 3.0 +28483,18039,0,"I don't know how I am supposed to correct the question when it apparently was faulty to begin with. I am not attempting to invalidate existing answers but I have no idea how I am otherwise supposed to get this question to get at least one upvote. If you have enough questions with 0 votes or less, you are prevented from asking more questions. So what would you have me do?",4/29/2018 19:47,,24090,CC BY-SA 3.0 +28484,18063,0,"If you asked the question it means you needed an answer, and so might someone else. You can definitely post answers to your own question and even mark them accepted if the solution works for you.",4/29/2018 19:51,,60,CC BY-SA 3.0 +28485,18039,0,"well, at least maybe explain what you mean by “output sink” and why you changed to it from the original title. I don’t think I’ve heard this term before.",4/29/2018 19:55,,60,CC BY-SA 3.0 +28486,18039,0,https://en.wikipedia.org/wiki/Sink_(computing),4/29/2018 19:57,,24090,CC BY-SA 3.0 +28487,18039,0,"An output sink is a generalized term to indicate any ""class or function designed to receive incoming events from another object or function.""",4/29/2018 19:59,,24090,CC BY-SA 3.0 +28488,18039,0,Thanks. I guess you *could* kinda apply it to the console output but it would be a pretty weird and unusual term for it. I’ll try to edit the question to express better what you apparently were trying to ask.,4/29/2018 20:02,,60,CC BY-SA 3.0 +28490,18120,1,Where can I learn it well?,4/29/2018 20:11,,23993,CC BY-SA 3.0 +28491,18127,0,are you sure the algorithm is a CRC and not some other chevksum/hash? where are you getting the data from?,4/29/2018 20:11,,60,CC BY-SA 3.0 +28497,18024,0,please add a link to the issue so others know it’s a bug. You can post it as an answer.,4/29/2018 20:34,,60,CC BY-SA 3.0 +28498,18024,1,@IgorSkochinsky Done.,4/29/2018 20:43,,11482,CC BY-SA 3.0 +28500,18127,0,"Well, I'm getting the values from software that I use and the documentation states that it is crc 32-bit 4 bytes.",4/29/2018 21:17,,24202,CC BY-SA 3.0 +28501,18127,0,"If you have the software calculating these, why not just try to find the code and see what is actually happening? Or is the question more about solving it the way you asked for?",4/29/2018 21:52,,23277,CC BY-SA 3.0 +28502,18105,0,"Ah, I see. I was wondering what the significance of the many one-byte references was. Thank you!",4/30/2018 1:40,,24160,CC BY-SA 3.0 +28504,18127,0,"I could try to find the code inside the program, but I indeed hope to learn how to solve it without doing that. Just for learning purposes.",4/30/2018 6:37,,24202,CC BY-SA 3.0 +28506,18124,0,"If I change the signature of any of the libraries then the UI does not show ""Recent files"" and ""Recent connections"". If I change back the libraries to the original signed ones everything works well. Also, in case I change the libraries I see security exceptions in OSX Console: `code requirement check failed (-67063), client is not Apple-signed`.",4/30/2018 7:08,,17982,CC BY-SA 3.0 +28509,18126,0,"Don't take legal advice from strangers on the Internet, investigate it yourself or ask a local expert. That said, in my opinion this is likely to be covered by the interoperability exception. Nobody can say for sure, but unless you actively set out to make financial harm to the company it's unlikely they will take any action, at least outside of their home country.",4/30/2018 11:40,,60,CC BY-SA 3.0 +28514,18135,0,"Veryyyyyyy Thanks! , my Ollydbg version is v 1.0 , i had to doing as you tell , command line + (Alt+F1) , it is 7EFDE000 .Can you please help me forward ....",4/30/2018 14:01,,24197,CC BY-SA 3.0 +28519,18135,0,Why can not receive identical Window as the exercise ??,4/30/2018 14:42,,24197,CC BY-SA 3.0 +28520,18135,0,i don't know what exercise the link you posted is to a tutorial and appears to have some trojan (hideme) trying to infect the visitor post relevent parts to what you did and where you are stuck,4/30/2018 14:49,,3473,CC BY-SA 3.0 +28522,18135,0,"I will to do all exercise from the page ,I have to download the program from here http://crackmes.cf/users/lafarge/lafarges_crackme_2/ , for me who not to have a clue , this exercise is gut , because it speak every step.....",4/30/2018 15:08,,24197,CC BY-SA 3.0 +28525,18135,0,what is your opinion what i should to do??,4/30/2018 16:07,,24197,CC BY-SA 3.0 +28526,18135,0,"The window handle is just a number assigned when the window is created, it's most likely different for each run, too.",4/30/2018 16:11,,23277,CC BY-SA 3.0 +28527,18135,0,"My Question at the Master , what should i to do for learn Code Cave because i can not does this exercise ...",4/30/2018 17:05,,24197,CC BY-SA 3.0 +28533,18127,0,"@EvillD This seems a rather strange comment w/r to tackle such a problem. Why did you then bother to check in reveng? It's reversing on a higher level. A little lower level would be to e.g. search in your code for magic CRC numbers. And following Johann Aydinbas advice would be the most straightforward way to reach your goal and ""be able to hash your own strings"".",5/1/2018 0:56,,12800,CC BY-SA 3.0 +28534,18126,0,"Why don't you contact the manufacturer and try to get their approval for your work? IMO, all what you describe to do is ""mostly harmless"" (with apologies to Douglas Adams).",5/1/2018 1:11,,12800,CC BY-SA 3.0 +28535,18127,1,@josh The reveng approach was for me to figure out if it was indeed possible to calculate the parameters with the known information in the first place.,5/1/2018 5:03,,24202,CC BY-SA 3.0 +28537,18135,0,"@blabb can you please tell me , how can i to see the trojan ...thanks",5/1/2018 10:28,,24197,CC BY-SA 3.0 +28538,18139,0,Could you be overlooking that for some file types binwalk must guess where the data starts and/or end?,5/1/2018 11:31,,2959,CC BY-SA 3.0 +28539,18097,0,"Or I have to take a fool way——get the function's pseudocode in form of strings,and then use some string manipulation to find out the xref to a variable",5/1/2018 12:54,,24157,CC BY-SA 3.0 +28540,18135,0,you can compare with fc anyway i added details to the answer,5/1/2018 14:32,,3473,CC BY-SA 3.0 +28541,18135,0,"you mean because a new extra section is , the troyan is to the new section .... , i know what you to speak.... https://haiderm.com/fully-undetectable-backdooring-pe-file/#Adding_a_new_Section_header_method Thanks",5/1/2018 14:57,,24197,CC BY-SA 3.0 +28542,18135,0,"The crackme.exe wich i working come from crackmes.cf .... . I will learn more about Assembly ... , now I am here , https://www.tutorialspoint.com/assembly_programming/index.htm later i will learn Code Cave here , https://www.codeproject.com/Articles/20240/The-Beginners-Guide-to-Codecaves .... you speak very gut , you can working as Teacher....",5/1/2018 15:29,,24197,CC BY-SA 3.0 +28545,18121,0,"Obviously, several peoples successfully reversed engineered it…",5/1/2018 21:04,,17379,CC BY-SA 3.0 +28546,18144,0,"Q4 could better be asked at [gamedev.se] (but it sounds very broad – it's a wide topic, and there are tons of tutorials available on just that single topic). By the way, are you sure an engine as modern as UnReal would not use quaternions instead?",5/1/2018 22:07,,2959,CC BY-SA 3.0 +28547,18144,0,"Yeah, I just figured I would throw Q4 in the mix if someone here happened to be able to roll off an answer or personal recommendations of resources. And yes, I'm certain that--at least with Unreal Engine 4 (which this game is coded in)--quaternions aren't being used...well, at least based on my experience with modifying XYZ values in quaternion-based games I've futzed with in Unity, which tend to warp/distort if modifying just one. The great thing about Unity is, sans obfuscation, it's easy to hook Unity's quaternion method to discover XYZW values. But this whole flycam thing is new to me.",5/1/2018 22:31,,20928,CC BY-SA 3.0 +28552,18138,0,"have you tried hashing the strings including the terminating 0, or maybe even padded to 4 bytes?",5/2/2018 8:42,,60,CC BY-SA 4.0 +28553,18135,0,"@ blabb Can you please give me a Tutorial for Reverse Eengineering but easy Understand for beginnen as me ..., thanks",5/2/2018 10:31,,24197,CC BY-SA 4.0 +28554,18148,1,Do you use a 32-bit or a 64-bit machine? Is the executable you are trying to debug is 32bit or 64bit?,5/2/2018 14:15,,18698,CC BY-SA 4.0 +28556,18139,0,what exactly is file.bin? how did you get it?,5/2/2018 16:37,,60,CC BY-SA 4.0 +28557,18148,0,"@Megabeets I was using 32 bit version, it turns out. Switched to 64bit and things are looking peachy.",5/2/2018 16:56,,3795,CC BY-SA 4.0 +28559,18148,0,Yup. That's what I thought. It's a bitness problem,5/2/2018 16:58,,18698,CC BY-SA 4.0 +28560,16345,0,"Just to be clear, you're talking about a network switch, right? Or do you mean something else, like the Nintendo Switch console?",5/2/2018 19:55,,24241,CC BY-SA 4.0 +28561,18139,0,"@IgorSkochinsky sorry that's just a placeholder. My file is a .private file created by the app, not .bin.",5/2/2018 20:24,,24223,CC BY-SA 4.0 +28562,18139,0,what app? what is the file supposed to contain?,5/2/2018 20:26,,60,CC BY-SA 4.0 +28563,18147,0,"I see, thanks for the insight. Can photorec carve from an individual file? It seems that it will only scan partitions for deleted files, not extract images from WITHIN an existing file. I tried throwing my file on a USB drive and running photorec and as predicted it just grabbed old deleted files from the drive, nothing from within my file.",5/2/2018 20:26,,24223,CC BY-SA 4.0 +28564,18147,0,you should use your file as if it's a drive image.,5/3/2018 7:28,,22324,CC BY-SA 4.0 +28565,18151,0,"for 32-bit drivers there was KmdKit tool by Four-F, have you tried it?",5/3/2018 8:11,,22324,CC BY-SA 4.0 +28566,18151,0,@AntonKukoba It's 64bit driver but I tried and throws same error :/,5/3/2018 9:43,,24242,CC BY-SA 4.0 +28567,18151,0,Are there any messages in the Windows Event log about your driver?,5/3/2018 10:11,,22324,CC BY-SA 4.0 +28568,18151,0,@AntonKukoba Dump: [pastebin](https://pastebin.com/E8RmY8Ei),5/3/2018 11:07,,24242,CC BY-SA 4.0 +28587,18155,0,"the english form is for us humans computers can understand only 83 ec 1c and cannot understand sub esp,1c the hex is for computers and teh sub esp,1c is the meaning of that hex bytes and it was interpreted by the disassembler from the hex bytes when you open any file in hex editor you can only see hex you cannot see the mnemonics anywhere",5/3/2018 19:17,,3473,CC BY-SA 4.0 +28588,18155,0,"updated the question a bit , maybe now this question makes more sense .",5/4/2018 0:18,,24017,CC BY-SA 4.0 +28590,18159,0,If you have the source code you should be able to assemble it and then use a debugger to step through the binary,5/4/2018 1:09,,18317,CC BY-SA 4.0 +28591,18155,0,"When you assemble an instruction the linker translate it to an opcode for the machine to understand (hex bytes). When disassembling we already have the assembled file as an opcodes so what the disassembler do is reverse it to a readable form e.g `83EC1C => sub esp, 0x1c`, the disassembler doesn't actually change anything in the file it just shows you the translation which is the assembly language instructions.",5/4/2018 1:15,,11482,CC BY-SA 4.0 +28594,18155,0,your original query and the edited one differs a lot in scope first you asked what is the hex bytes now you are asking about the number of hexbytes both are very different the setting possibly exists to show only a limited amount of bytes x86 instruction set is a variable length instruction set it varies from 1 hexbyte to 15 hexbyte max with that setting at 6 if an instruction has more than 6 hexbytes they would be truncated from display (only in display ),5/4/2018 11:24,,3473,CC BY-SA 4.0 +28597,18166,0,What is your version of radare2 (paste the output of `r2 - v`)? Is 2700 the pid of the process? Please share more information.,5/4/2018 16:37,,18698,CC BY-SA 4.0 +28598,18166,0,"@Megabeets Yes, 2700 is a process. `radare2 2.6.0-git 18087 @ linux-x86-64 git.2.5.0-176-gcbe9a12be +commit: cbe9a12be2d1d8cc39b757b9034cb29ce097e768 build: 2018-05-04__22:24:54`",5/4/2018 19:28,,19827,CC BY-SA 4.0 +28599,18166,0,What happens after you do `e asm.bits=32` and than pd 10?,5/4/2018 19:44,,18698,CC BY-SA 4.0 +28600,18166,0,"@Megabeets I try, but no change. I paste my `e` full config in main post.",5/4/2018 20:14,,19827,CC BY-SA 4.0 +28601,18166,0,"@Megabeets When I try 'e cfg.bigendian=true' the situation is improving slightly, but there are still unidentified teams.",5/4/2018 20:31,,19827,CC BY-SA 4.0 +28603,18163,0,So I tried this out and it turns out some of the hex digits in my source code arent accepted by this emulator... I guess I'll going to have to resort to just looking at the code itself.,5/4/2018 22:39,,24255,CC BY-SA 4.0 +28605,18138,1,"I just did for the terminating 0 (no result), and padded to 4 byte it ran more than an hour until I had to cancel it.",5/5/2018 2:24,,23277,CC BY-SA 4.0 +28607,18177,1,"thanks, nice answer. However, if you have given methods (examples) how to do each thing you are describing, should have been excellent answer!",5/5/2018 6:33,,10008,CC BY-SA 4.0 +28608,18183,0,Not sure if xmm0 getting used there? But if so then the first param should be a float not an int because by convention the xmm number reflects it's position.,5/5/2018 22:42,,11482,CC BY-SA 4.0 +28609,18166,0,share the file.,5/6/2018 16:32,,18317,CC BY-SA 4.0 +28610,18166,0,@SYS_V this file [this File](https://drive.google.com/open?id=1socXlGx84o25QpfNjNJRAR1ldM4IQoK0) [squashfs-root](https://drive.google.com/file/d/1dDsSsBa_MIAZJIhna6-XtCT8pUvqn7hC/view?usp=sharing) Start this binary only `chroot` or full emulation qemu. cuz he damage the sistem.,5/6/2018 16:51,,19827,CC BY-SA 4.0 +28611,18166,0,And gdbserver + gdb-multiarc + qemu-system(full emul) session open normaly.,5/6/2018 17:11,,19827,CC BY-SA 4.0 +28613,18191,1,"OK. First, this not a virus, I think this a backdoor maid in factory. You check the static analys, if you see the 'strings' output, you see some intresting string. But I want dynamic analys. If I set 'bin.baddr' in start radare, it solve the problem?",5/6/2018 20:29,,19827,CC BY-SA 4.0 +28614,18191,0,"@VasiliyKuramshin The point is that there is no evidence of anti-analysis tricks. Section information is present, the entry point in conventional, etc. Meaning that the error you are seeing is not due to some aspect of the binary interfering with loading it into virtual memory. It is either emulation environment error or user error. Either way, it is not a reverse engineering problem.",5/6/2018 20:35,,18317,CC BY-SA 4.0 +28615,18183,0,"From my understanding the arguments are separated by type first. If you have a function with (char,float,int,float), we have two pairs (char,int) and (float,float) which get assigned to (rdi,rsi) and (xmm0,xmm1)",5/6/2018 21:29,,23277,CC BY-SA 4.0 +28616,18192,0,"Have you tried setting a bp on `0x402B5D` and maybe tell OllyDbg to pass on int3 exceptions? I think I did something like this a long time ago, only the actual bps triggered, but not int3 calls.",5/6/2018 21:34,,23277,CC BY-SA 4.0 +28617,18183,0,"Then how do I know in which order they are? I've watched one tutorial saying that if, lets say third param is the first float argument then it'll get stored in xmm2 and so on... That might be only for Windows ABI?",5/6/2018 21:34,,11482,CC BY-SA 4.0 +28618,18183,0,According to this: https://people.freebsd.org/~obrien/amd64-elf-abi.pdf it's as I described. Basically it just uses the next free xmmN register. See page 17 at the bottom for the process behind register allocation.,5/6/2018 21:47,,23277,CC BY-SA 4.0 +28619,18178,0,Thanks for posting your solution! It'll be great to keep for future reference.,5/6/2018 22:43,,20928,CC BY-SA 4.0 +28620,18191,0,"@SYS_V - what tool did you use to generate that header visualization? I haven't seen that before, looks pretty cool.",5/7/2018 1:53,,16966,CC BY-SA 4.0 +28621,18190,0,"Thanks a lot for another example blabb , i would like to learn more about win 32 programming and how its functions are included in the program .Maybe i should continue looking for some examples of win 32 programming :)",5/7/2018 2:09,,24017,CC BY-SA 4.0 +28622,18191,0,"@3pidemix it is a tool I am developing to visually explore ELF binaries. I can ping you once I release it, if you are interested. It will take a while though.",5/7/2018 2:22,,18317,CC BY-SA 4.0 +28623,18191,1,"Please do, it looks like it would be a great educational tool!",5/7/2018 2:32,,16966,CC BY-SA 4.0 +28625,13411,0,[McSema](https://github.com/trailofbits/mcsema) and [CMU BAP](https://github.com/BinaryAnalysisPlatform/bap) seem promising.,5/7/2018 2:40,,1571,CC BY-SA 4.0 +28627,18195,1,"there's no generic bypass solution AFAIK, so you'll have to learn how this exact malware detects the VM, and implement your own bypass.",5/7/2018 7:16,,22324,CC BY-SA 4.0 +28629,18199,1,Why not just make a print screen?,5/7/2018 7:59,,23761,CC BY-SA 4.0 +28630,18199,0,"Because the image size is to small and the image is put in an round shape, I need a bigger rectangle version.",5/7/2018 8:00,,24291,CC BY-SA 4.0 +28632,18192,0,I'll try out your suggestion and come back with feedback.,5/7/2018 8:26,,24282,CC BY-SA 4.0 +28633,18194,0,I'll have more time on my hands this evening - I'll try out the stuff you have suggested and then make a follow up. Thank you.,5/7/2018 8:28,,24282,CC BY-SA 4.0 +28638,18199,0,You can use this[Packet Capture App](https://play.google.com/store/apps/details?id=app.greyshirts.sslcapture&hl=en) or add `view-source` before the URL of that page and find the direct link of that picture in HTML.,5/7/2018 14:01,,23069,CC BY-SA 4.0 +28639,18201,0,Rooting my phone is not an option for me. I first have to see if the app uses SSL. Also decompiling is an good option to look at thanks for the help.,5/7/2018 14:02,,24291,CC BY-SA 4.0 +28640,18199,0,"I managed to get to the url, I found encoded test. I have to figure out how to decode it. Maybe decompiling the app is an option. Thanks.",5/7/2018 14:31,,24291,CC BY-SA 4.0 +28641,18183,0,"Appreciate your input but my question still persist, how do I know the order of mixed up params (ints and floats)? Been researching from last night but couldn't find a proper explanation so far.",5/7/2018 16:50,,11482,CC BY-SA 4.0 +28642,18199,0,I managed to get my image. The only thing I had to do was creating an script to get the response of that page whits where raw bytes and than convert that to an image. Thanks for the help @Biswapriyo,5/7/2018 18:33,,24291,CC BY-SA 4.0 +28644,18194,0,THANK YOU SO MUCH. That's it. That's what I was looking for.,5/7/2018 19:07,,24282,CC BY-SA 4.0 +28645,18194,0,"So, for anyone having the same problem: use ""uf ntdll!ExecuteHandler2"" in WinDBG to get the address of the ExceptionHandler then set a breakpoint at that address (I use x32dbg to debug rather than Ollie or the other debuggers). Now you can use Step Into just like you want, without the debugger skipping over the lines.",5/7/2018 19:11,,24282,CC BY-SA 4.0 +28646,18192,0,"Setting a breakpoint at ""ntdll!ExecuteHandler2"" (as blabb suggested) did the trick.",5/7/2018 19:13,,24282,CC BY-SA 4.0 +28647,18194,0,why windbg you can use ctrl+g in x32dbg and type ExecuteHan for selecting the autocomplete you can setup symbol path in option -> misc,5/7/2018 19:34,,3473,CC BY-SA 4.0 +28648,18176,0,Colud you mention the decompilers that support ndk?,5/7/2018 22:23,,23870,CC BY-SA 4.0 +28650,18211,0,"In most cases I believe you are correct, the IV is just prephended to the cipertext, but I do not believe it's a requirement. In this case, it does not appear to be prepended. With regards to not needing it, as you can see, without it, the first block does not get decrypted correctly. My assumption was that the IV must be known in order for this to work?",5/8/2018 10:00,,24296,CC BY-SA 4.0 +28651,18209,0,Thank you for the insightful explanation. A bitwise complement of the Integer representation of the timestamp was indeed the solution.,5/8/2018 10:17,,24296,CC BY-SA 4.0 +28652,18211,0,Are you sure that you extract IV and pass it to 'aes_cbc_encrypt' properly?,5/8/2018 10:25,,22324,CC BY-SA 4.0 +28654,18184,0,I use IDA 6.8 and IDAPython v1.7.2. In my case the spell is `idaapi.get_highlighted_identifier()`.,5/8/2018 16:38,,22561,CC BY-SA 4.0 +28655,18202,1,"That doesn't create a new decompiler variable. That's for re-naming a variable in the disassembly (Put your cursor over a register and hit ""N"").",5/8/2018 19:01,,12613,CC BY-SA 4.0 +28657,18215,0,if I only have `0xffff6004` how do I come to `0xa000` please?,5/8/2018 20:32,,24303,CC BY-SA 4.0 +28658,18214,0,"Good idea. It would not be able to fix displaying of the variable in the second line, where the addressof operator is used on the merged variable (still displays only `&pbdfOrLength` without any member access), but I guess this is the best solution possible.",5/8/2018 20:36,,6957,CC BY-SA 4.0 +28659,18214,0,Bummer. I didn't realize it would act that way for the address operator. Appreciate the info.,5/8/2018 21:48,,12613,CC BY-SA 4.0 +28661,18204,0,Does SDcard require root access? In my Redmi 5A it can be browsed normal folder.,5/9/2018 2:40,,23069,CC BY-SA 4.0 +28663,18204,0,"maybe, actualy you do not need always root access to access the cache of an app. Go to the folder: /mnt/sdcard/Android/data//Cache. If this folder is not located it can be that the app has made the cache invisible in this case you need to root you phone.",5/9/2018 6:40,,24291,CC BY-SA 4.0 +28664,18215,0,you should read a lot this is a simple 2 s complement notation you are asking the wrong questions if you are trying to reverse something you should know this by heart and should be able to recognize 2s complements just by seeing them any way i have added details to my answer,5/9/2018 9:25,,3473,CC BY-SA 4.0 +28665,18218,0,it's exist in ollydbg you can search for 1 cmd or multiple cmd,5/9/2018 9:57,,20481,CC BY-SA 4.0 +28666,18218,0,would you explain to me how it's done?,5/9/2018 10:08,,24315,CC BY-SA 4.0 +28670,18222,0,"Amazing answer ,i know about Endianness but got a little confused.just one more thing you said ""The stack is not intrinsically 64-bit, it's just a memory area which can contains anything.""so how much bits or bytes can be stored on a single memory location i.e single memory address",5/10/2018 5:44,,24317,CC BY-SA 4.0 +28671,18222,0,@shujaat on x86/x64 - one byte (8 bits) per address location,5/10/2018 6:06,,60,CC BY-SA 4.0 +28672,18217,0,is it possible you provide the link to this crackme?,5/10/2018 6:17,,18014,CC BY-SA 4.0 +28674,17156,0,If it's HEX file it already contains the ROM addresses.,5/10/2018 7:58,,22324,CC BY-SA 4.0 +28675,18217,0,https://hackers.gg/challenges/pwnables/advanced3/robot_city,5/10/2018 9:09,,24178,CC BY-SA 4.0 +28676,18217,0,here it is @PawełŁukasik,5/10/2018 15:27,,24178,CC BY-SA 4.0 +28679,18216,0,"I found different way when I have this problem. Than, it works..But I will try again asap. Thank you again.",5/10/2018 20:51,,13024,CC BY-SA 4.0 +28680,18217,0,"have some time yesterday, but don't have a solution yet. Looks like the issue is with this additional bin/sh being spawned there...",5/11/2018 6:33,,18014,CC BY-SA 4.0 +28681,18217,0,That sounds strange. Did not even know that that was happening.,5/11/2018 12:36,,24178,CC BY-SA 4.0 +28682,18217,0,but for sure you've seen the /bin/sh in this binary. I think it's being executed in a clever way. Still investigating this bin though,5/11/2018 12:44,,18014,CC BY-SA 4.0 +28683,18234,1,Alas it does not support AVR.,5/11/2018 13:13,,60,CC BY-SA 4.0 +28688,18236,0,"Thanks for the helpful input. Though my version was up to date, this solution did allow me to get the program to accept some input. However, strangely enough, execution stops immediately thereafter and should continue to more questions upon validation of this input. Perhaps this is due to the binary as you are suggesting.",5/11/2018 21:02,,24178,CC BY-SA 4.0 +28691,18236,0,"UPDATE: Was able to get the input validated and a second question was outputted in succession finally, turns out running the dc command an extra time before the script quits fixes this stream issue. :O",5/11/2018 21:38,,24178,CC BY-SA 4.0 +28693,18236,0,"my comment about old version of r2 was due to the fact that on my latest version this command: `value1=int(r.cmd('? [ebp+0xc];').split(sep, 1)[0])` doesn't work as the output from ? is in a forma that can't be parsed by int.",5/12/2018 5:36,,18014,CC BY-SA 4.0 +28694,18192,0,"Another trick that might be useful, use the SEH view to see where the debuggee is going whenever an exception happens. At the moment x64dbg is not built to automatically set a breakpoint there but with a simple plugin you could easily do this...",5/12/2018 8:26,,2221,CC BY-SA 4.0 +28695,8031,2,"likely just the linker, not packer. https://blogs.msdn.microsoft.com/russellk/2005/03/20/lnk4217/",5/12/2018 11:38,,60,CC BY-SA 4.0 +28696,18236,0,"Huh, works for me however 2.5.0. But ran into a separate issue after further debugging. Ended up putting those beefy equations in a function to open input.txt and update it, so that the binary's first question is indeed answered correctly, then by the next question the next answer is accounted for. Also correct, however, it seems rarun is not passing the updated value of input.txt for the second question. IE. the first one is answered successfully but the second one comes up as incorrect even though input.txt is updated to the 2nd answer. Thinking rarun2 might not reload input fornext question",5/12/2018 14:33,,24178,CC BY-SA 4.0 +28699,18245,0,What have you tried so far? Please elaborate so we can attempt to help without starting from zero.,5/12/2018 22:12,,245,CC BY-SA 4.0 +28700,18245,0,have you done exactly what they are writing on the github? I've just did it an plugin is visible w/o any problems.,5/13/2018 9:11,,18014,CC BY-SA 4.0 +28701,18250,0,"can you extract code from the device, or is there a firmware update available? similar question about the receiving side.",5/13/2018 10:28,,60,CC BY-SA 4.0 +28702,18254,2,What do you want to change it too?,5/13/2018 12:56,,1739,CC BY-SA 4.0 +28703,18252,2,please give this question a more meaningful title,5/13/2018 12:56,,18014,CC BY-SA 4.0 +28705,18250,2,"Its a PIC mcu no firmware available and code protection bit enabled, receiver is the same. The rf side is a cc1101, but none of its packet control feature enabled, so they are handling everything in the pic.",5/13/2018 14:32,,24363,CC BY-SA 4.0 +28707,18257,3,Why don't you spend some time describing what you already tried first? It will spare our time and you will get more accurate answers.,5/13/2018 16:19,,53,CC BY-SA 4.0 +28710,18240,0,Or you could use insn_t::itype,5/13/2018 16:33,,1842,CC BY-SA 4.0 +28711,18240,0,Note also that many risc cpu's store operands as bitfields in the opcode.,5/13/2018 16:35,,1842,CC BY-SA 4.0 +28712,18257,2,Go learn assembly... there is no other way if you want to reverse a binary program.,5/13/2018 18:32,,53,CC BY-SA 4.0 +28717,18252,0,You're passing a flag? Where? It's not clear to me what you're asking here.,5/14/2018 8:29,,245,CC BY-SA 4.0 +28718,18256,1,"That's a bit of a broad question. I suggest you mention (either by tag or in the body) the architecture (""CPU"") as well as the environment (""OS"") and what exactly you have been trying.",5/14/2018 8:31,,245,CC BY-SA 4.0 +28721,17937,0,"Many thanks @blabb for your very complete and detailed answer! While this answers my question, I subjectively preferred the python approach. If I was able to mark multiple answers as valid, yours would be definitely one!",5/14/2018 10:55,,2931,CC BY-SA 4.0 +28723,18263,0,"If like a Smartcard or a SIM card, the ""how it works"" is covered very well here: https://reverseengineering.stackexchange.com/questions/15011/how-does-a-sim-card-work",5/14/2018 17:01,,18580,CC BY-SA 4.0 +28724,18256,0,Sir I am using Windows 10 operating system. The application I am reversing is AESCrypt and 7-zip. The Tool I am using for disassembly is IDA pro and also used findcrypt2 plugin but it did not work well. I have looked for the S-box and used the plugin to detect that specific area but I have no clue where to look.,5/14/2018 17:17,,24371,CC BY-SA 4.0 +28726,18257,1,Of course there's a myriad of ways to camouflage the S-Box and only reveal it at runtime.,5/14/2018 17:50,,245,CC BY-SA 4.0 +28728,18267,1,IDA is a 64-bit application,5/14/2018 18:31,,1413,CC BY-SA 4.0 +28729,18267,0,Maybe but I guess it is supporting x86. Because I was using with Windows7x86. But I do not know what happen after while.,5/14/2018 18:36,,13024,CC BY-SA 4.0 +28730,18265,0,"Thank You! I really appreciate your time, and i also tested this algorithm with slight modification and indeed works like a charm.",5/14/2018 19:10,,24363,CC BY-SA 4.0 +28732,18216,0,"VirtualBox is slow for windows kernel debug, maybe you can try another vm platform(ex, Vmware, VirtualFD).",5/14/2018 23:27,,24310,CC BY-SA 4.0 +28733,12965,1,"A bit odd. If you check `extsd_new.exe.enc`, you see multiple lines of just FF FF FF FF. That's an odd sight when you assume this file to be compressed or encrypted. Can you compare the file size of extsd_new (encoded vs. plain) - is this maybe an uncompressed file?",5/15/2018 0:04,,23277,CC BY-SA 4.0 +28734,18235,0,"Adding to my answer - I guess the key really seems to be wrong because it makes no sense. It decrypts a fixed string with a random key (first 16 bytes of the UUID), I don't see how this would ever work without sheer luck.",5/15/2018 3:44,,23277,CC BY-SA 4.0 +28735,18270,0,"Thanks a lot .I have only used IDA pro , PE explorer and CFF explorer to view the disassembled code , CFF explorer is a bit of a disappointment then .",5/15/2018 4:59,,24017,CC BY-SA 4.0 +28736,18265,0,@RáczAttila what modification did you have to make?,5/15/2018 6:05,,60,CC BY-SA 4.0 +28738,18270,0,@wikilol those tools have different use-cases. Comparing them is a bit stupid. CFF explorer has this **Quick** disassembler for convenience. It's PE editor. IDA is a fully fledged disassembler/debugger.,5/15/2018 6:14,,18014,CC BY-SA 4.0 +28739,12965,1,there's also this clear UPX! that would suggest UPX exe packer? Also this MX could be a hidden form of MZ from an DOS executable?,5/15/2018 6:25,,18014,CC BY-SA 4.0 +28741,18265,1,"Because i used python2.7 the binascii method not worked. I had to use data= line.split("","") and checksum += int(c,16).",5/15/2018 7:23,,24363,CC BY-SA 4.0 +28742,18269,0,Both has same call instruction at same mem location (as expected). Just the representation is different.,5/15/2018 8:15,,23069,CC BY-SA 4.0 +28743,18272,0,Excellent answer. For the first part of the question - is it simple or more complex. Clearly it is not just simple. And with this small amount of memory they clearly are not storing full biometrics. I wonder what information is stored in the microchips...?,5/15/2018 8:22,,18580,CC BY-SA 4.0 +28744,18272,0,where did you find the exact model?,5/15/2018 12:57,,60,CC BY-SA 4.0 +28745,18270,0,"OK , I think i am stuck again , i thought with some application i can see the entire function in the disassembled code , just read about ltrace and strace for linux , let me see if i can find a windows equivalent ...Thanks for the reply everyone :)",5/15/2018 17:08,,24017,CC BY-SA 4.0 +28747,18280,0,the question 'Why there are not any disassemblers that can generate re-assemblable asm code?.' is what I wanted to know. Thanks for pointing this out,5/15/2018 20:56,,24402,CC BY-SA 4.0 +28748,18281,1,"Another great decompiler, free and easy to use, is https://retdec.com/",5/16/2018 2:39,,11615,CC BY-SA 4.0 +28749,18270,0,"@wikilolthen you see, your question should not be about CFF but what is an alternative for IDA I guess; https://reverseengineering.stackexchange.com/questions/1817/is-there-any-disassembler-to-rival-ida-pro",5/16/2018 6:29,,18014,CC BY-SA 4.0 +28750,18272,0,For example https://www.youtube.com/watch?v=0AwnZ5wL2fI,5/16/2018 8:18,,22324,CC BY-SA 4.0 +28757,18235,0,"Instead of trying to reverse engineer the encryption algorithm, you can try hooking the original decryption function using frida (https://www.frida.re/docs/android/)",5/16/2018 17:23,,24410,CC BY-SA 4.0 +28758,18170,2,https://github.com/cryptax/androidre,5/16/2018 17:29,,3989,CC BY-SA 4.0 +28760,18289,1,could you share a sample? working from an actual example may be more practical,5/16/2018 17:59,,60,CC BY-SA 4.0 +28761,18288,0,what does the system consist of? Is it a generic PC or a special box? Do you have access to the files? What specifically is the server running? try to describe it in more detail.,5/16/2018 18:01,,60,CC BY-SA 4.0 +28763,18293,0,But _sometimes_ it doesn't treat variable as whole 128bit or GUID type (4 mem struct). Like following allocation: `x=a->m128i_i64[0]` and `y=a->m128i_i64[1]`.,5/16/2018 19:54,,23069,CC BY-SA 4.0 +28764,18293,0,"A GUID is defined as a structure with a number of fields. The original compiler here was smart enough to understand that the whole structure can be stored using a single _mm_store_si128 instruction. If an access is being made to part of the GUID, the memory access will be sized accordingly. Here separate modifications are being made to the first and second 64-bit parts respectively.. The original compiler is using operations on 64-bit general purpose registers to do this.",5/16/2018 20:01,,4731,CC BY-SA 4.0 +28766,18288,0,"It is running on a Windows XP machine and I do have fulled access to the system. It is a web interface to some utilities (Lights, heating and air) at an old building.",5/16/2018 21:43,,21244,CC BY-SA 4.0 +28769,18295,0,`0xdeadbeef` is not non-printable. It is what is commonly known as`hexspeak`,5/17/2018 2:42,,4658,CC BY-SA 4.0 +28770,18300,0,What calling convention is this function? Are `var_44` and `var_40` used?,5/17/2018 3:04,,23277,CC BY-SA 4.0 +28771,18300,0,yes they are used but to initialize ecx register later. Thats the only other occurence i could find with them,5/17/2018 3:11,,24416,CC BY-SA 4.0 +28772,18300,2,"If this is a Delphi program, then it fits the Borland calling convention (first three arguments in eax, edx, ecx, rest on the stack). That means those two are just regular arguments to the function.",5/17/2018 3:38,,23277,CC BY-SA 4.0 +28773,18298,0,"I didn't want to add code samples because I'm dealing with a commercial software here, I'll try to mock some of the code there and add to the question.",5/17/2018 4:49,,24410,CC BY-SA 4.0 +28774,18298,0,"Okay, I went back and looked at the decompiled code again and it looks like I confused the method invocation due to variable name reuse. They are actually invoking a method, not a string. (I'm using two decompilers because some sections of the code does not get decompile in the other)",5/17/2018 6:06,,24410,CC BY-SA 4.0 +28777,18300,0,"You are giving us too little info to answer this question. It basically depends on ABI. Might be just zeroing/init, might be something else. Is it main method? Other?",5/17/2018 6:54,,18014,CC BY-SA 4.0 +28778,18290,2,Next question you should ask is what's the difference between SHR and SAR :),5/17/2018 7:30,,22324,CC BY-SA 4.0 +28779,18301,1,AFAIK https://frida.re/ should solve the problem,5/17/2018 7:46,,2318,CC BY-SA 4.0 +28780,18283,0,But it is a literal value and not a data structure. An integer not an array of ints,5/17/2018 9:42,,24400,CC BY-SA 4.0 +28781,18282,0,Thanks for the reply. I was wondering if there is a way to achieve this via script. As I have near a thousand functions in need of changing,5/17/2018 9:44,,24400,CC BY-SA 4.0 +28785,4481,0,"Hey, I was just playing this game! I'd love to find out what progress you were able to make on this.",5/17/2018 13:52,,10364,CC BY-SA 4.0 +28787,18288,0,is the UI web-based? what do the URLs look like? did you try finding the files handling the requests on the server? try adding more details to the question (use the edit link),5/17/2018 16:43,,60,CC BY-SA 4.0 +28788,14746,0,Protostar 6? I'm getting exactly the same problem. Did you solve it?,5/17/2018 17:11,,24423,CC BY-SA 4.0 +28789,18257,0,Sir thank you for your guideline. I want to say I have successfully identified the S-Box and that was in 7z.dll file not in exe. Now I want to know what should I do to see what key length is used and which type of encryption is used like CBC/ECB etc,5/17/2018 17:59,,24371,CC BY-SA 4.0 +28790,18283,0,"I tried it and got +v8 = (signed int)&loc_1048592D;",5/17/2018 18:19,,24400,CC BY-SA 4.0 +28791,18304,0,entry point for what dll or IE i didn't get what u mean so can explain more ?,5/17/2018 18:41,,20481,CC BY-SA 4.0 +28792,18288,0,I have looked for files on the server and other files. I think at this point the one way to get into it is find the original developer if he/she is still around or using the posted data to reverse engineer the code making with some trial and error.,5/17/2018 21:29,,21244,CC BY-SA 4.0 +28793,2305,0,"The only other `nop` instruction is `0F 1F /0` which is `NOP r/m16` and `NOP r/m32` on supported CPUs. It may take anywhere from 3 to 9 bytes in x86-64, as per [Intel doc](https://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-instruction-set-reference-manual-325383.pdf) (page 4-163). So even though you can use `mov eax, eax` and others an an alternative, it has a downside vs. real `nop` in that it blocks CPU pipeline and lacks other hardware optimizations that are implemented in the `nop` instruction.",5/17/2018 21:45,,24427,CC BY-SA 4.0 +28794,18267,0,Try these ready-made VM from https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/ use Win10 x64.,5/18/2018 5:31,,23069,CC BY-SA 4.0 +28795,18277,3,Possible duplicate of [Why does IDA show wrong function arguments in pseudocode?](https://reverseengineering.stackexchange.com/questions/17872/why-does-ida-show-wrong-function-arguments-in-pseudocode),5/18/2018 5:37,,23069,CC BY-SA 4.0 +28796,12392,0,"The link seems dead, is it possible to get a new one?",5/18/2018 5:42,,6957,CC BY-SA 4.0 +28798,18305,2,"Since you appear to have the latest IDA and it crashes, you can probably contact support with this question.",5/18/2018 11:18,,2221,CC BY-SA 4.0 +28799,18304,1,dnSpy is miles better than anything else out there. As a bonus you can also use it to debug executables you don’t have the source for.,5/18/2018 11:19,,2221,CC BY-SA 4.0 +28800,18301,0,"It doesn't, frida.re appears to use the same PLT/GOT hooking technique.",5/18/2018 12:04,,14204,CC BY-SA 4.0 +28802,18146,0,This was one of the issue. After I changed the process flow to 1) move the file 2) sign it in /Application folder with a proper apple signed signature it was able to read the plist. Thanks!,5/18/2018 19:37,,17982,CC BY-SA 4.0 +28803,18305,0,"A good idea, thanks. I was somewhat afraid to be using the syntax incorrectly, but I will ask them about it.",5/18/2018 22:10,,23944,CC BY-SA 4.0 +28805,18318,0,Please give this question with a bit more descriptive title,5/19/2018 13:44,,18014,CC BY-SA 4.0 +28806,18319,0,"Thanks Megabeets , I think i read your website few hours ago , i think it was about radare2 :)",5/19/2018 14:11,,24017,CC BY-SA 4.0 +28807,18318,0,what is your question? We're not mind readers. Please be more specific and fix the title.,5/19/2018 17:55,,60,CC BY-SA 4.0 +28808,18319,1,"""sub"" is actualy from ""subroutine"". not ""submodule""",5/19/2018 17:55,,60,CC BY-SA 4.0 +28813,18288,2,"It would be useful to give more information about the company, even if it does not exist, as well as the specific system.",5/19/2018 20:11,,18945,CC BY-SA 4.0 +28814,18318,0,"Edited the question , i hope there is more clarity now",5/19/2018 20:13,,24017,CC BY-SA 4.0 +28815,17794,0,Is there any relation with this subroutine and COM vtable/function pointer?,5/19/2018 20:28,,23069,CC BY-SA 4.0 +28817,18318,1,"Please don't edit the entire question. If you have another question, please open a new post. If you want to clarify your question, please add your editions to the original post without deleting its content.",5/20/2018 7:09,,18698,CC BY-SA 4.0 +28819,18322,0,what about the two calls in the listing? Or the caller of this function?,5/20/2018 13:58,,60,CC BY-SA 4.0 +28820,18323,2,Try putting a breakpoint somewhere higher on the call stack. Wow64 is strange and it might show a bogus EIP for threads that are not in user space.,5/20/2018 14:10,,2221,CC BY-SA 4.0 +28821,18322,0,"the 2 calls are not called, the function itself is not called either, at least when i bp the function at the start it is not called (at least not for the CRC calculation). the first instruction that is executed here / that you can bp is movsd qword ... (the yellow marked part)",5/20/2018 14:38,,24453,CC BY-SA 4.0 +28822,18301,0,https://blog.quarkslab.com/when-sidechannelmarvels-meet-lief.html,5/20/2018 23:31,,18317,CC BY-SA 4.0 +28824,18322,0,"can you show us the bytes for the opcodes and addresses? This `and al,[rdx+r14*8-7BFAEFF1h]` looks strange and I suspect some obfuscation going on which IDA maybe fails to recognize and shows you the wrong disassembly.",5/21/2018 10:36,,18014,CC BY-SA 4.0 +28826,18284,0,Thank you for your feedback. I tried on x64 than it works.,5/21/2018 23:54,,13024,CC BY-SA 4.0 +28827,18267,0,It is working on x64.,5/21/2018 23:58,,13024,CC BY-SA 4.0 +28828,18283,0,"I've update the answer, I hope it helps.",5/22/2018 8:13,,22324,CC BY-SA 4.0 +28829,17479,1,Have you tried this one https://github.com/viruscamp/luadec ?,5/22/2018 8:15,,22324,CC BY-SA 4.0 +28830,18322,0,https://i.imgur.com/wGE8XX5.png here are the bytes of this function,5/22/2018 8:19,,24453,CC BY-SA 4.0 +28831,18305,0,"Does it work if you declare it like this? +int __cdecl test(int a1, int a2, int * return1, int * return2)",5/22/2018 8:23,,22324,CC BY-SA 4.0 +28832,18305,0,"Dear @AntonKukoba, thanks for the idea, sadly it doesn't work. In that case, it just thinks that the arguments are `int` pointers rather than `int`s, nothing else changes.",5/22/2018 9:34,,23944,CC BY-SA 4.0 +28833,18305,0,"Can you give me a sample, I'd like to experiment",5/22/2018 10:04,,22324,CC BY-SA 4.0 +28834,18305,0,"Dear @AntonKukoba, I added the Go code I used for the example and the compile commands, is that alright?",5/22/2018 10:43,,23944,CC BY-SA 4.0 +28835,18305,0,"I need a binary to load to IDA, And the address of the function which you analyze. I don't have the environment for Go.",5/22/2018 11:04,,22324,CC BY-SA 4.0 +28837,15279,0,Did you ever figure out how to decode this?,5/23/2018 0:17,,24480,CC BY-SA 4.0 +28838,18332,0,"The code is obfuscated by Arxan GuardIT. If IDA is actually infinitely looping here, that's a bug, which might also affect the 7.x commercial line. If so, Hex-Rays might fix it upstream and could possibly release a new freeware build. But, given that Hex-Rays states on the freeware download page that this version ""comes without technical support"", they probably won't reply to a support mail. Your best and only option is to hope an IDA developer sees and confirms this, reproduces it in commercial builds, fixes it, and releases a new freeware. I wouldn't hold my breath for a freeware update.",5/23/2018 7:03,,182,CC BY-SA 4.0 +28840,18333,0,Thank`s! Can i make automatic this process?,5/23/2018 16:35,,24477,CC BY-SA 4.0 +28841,18337,0,"Thank's u! It's unreal amazing! You is best php guy! Can i automatic this calculating, like `round(round(0) + 1.75 + 1.75 + 1.75 + 1.75)` and deobf this string to real code?",5/23/2018 16:38,,24477,CC BY-SA 4.0 +28842,18331,1,"I unfortunelly can't edit my post, maybe can i automatized decoding and deobf this code?",5/23/2018 16:43,,24477,CC BY-SA 4.0 +28843,18339,0,Can de4dot deobfuscated any .NET executable?,5/23/2018 17:02,,23069,CC BY-SA 4.0 +28844,18333,0,I guess you could try to automate this somehow but probably it would require more time than calculating it once and then find&replace,5/23/2018 17:05,,18014,CC BY-SA 4.0 +28846,18337,0,use notepad++ hi ctrl+alt+b to select everything between braces make it a variable like $deob1= (round(.......ro...ro...) and evaluate that and replace the original,5/23/2018 17:13,,3473,CC BY-SA 4.0 +28847,18339,0,No. But it'll try and usually will output a bit less-obfuscated binary. There are indeed obfuscators that will beat de4dot,5/23/2018 17:39,,18698,CC BY-SA 4.0 +28849,18288,0,Have you tried looking around LinkedIn for people who worked for the company--specifically technical support or developers who might have touched the product enough to possibly give you guidance?,5/23/2018 19:25,,20928,CC BY-SA 4.0 +28850,18343,0,"Thank you very much for your time, as a matter of fact my target is the Motorola series. Using `objdump -i` I don't see it listed, so I might have to go the custom build path...",5/23/2018 21:17,,24346,CC BY-SA 4.0 +28851,18340,0,"If you step into the `call system`, does it actually end up in the correct place?",5/23/2018 21:29,,60,CC BY-SA 4.0 +28852,18345,0,"Sorry I have trouble explaining myself sometimes. Is there a way to use Visual Mode using this method? or is it possible to throw the webserver in the background and use r2 normally in a single terminal? Then if I want to invoke a task in my script from the r2 in that terminal, the script can connect to the webserver instead and do its thing. That would be perfect. Your answer is exactly what I'm looking for btw thanks a bunch!!",5/23/2018 22:08,,24439,CC BY-SA 4.0 +28853,18345,2,Hold up! I got it. I open a file with r2. Then do `e http.sandbox=false` (so I can run scripts) and `=h&` and boom webservice in background and r2 still running normally! The setup I'm after may seem a little strange but everything works like I originally wanted. My python server runs and when a command is received it connects to the webservice and forwards any r2.cmd()'s to it! Thanks again for your help!,5/23/2018 23:36,,24439,CC BY-SA 4.0 +28857,18340,0,"If you're on a Linux system with a custom shell (e.g bash). could you try statically patching the ""/bin/sh"" string by changing it to ""/bin/bash"" for example (hopefully, the length wouldn't be an issue or would only shorten a consecutive string). And have you tried running the program/gdb as root? Also, may I ask which CTF series it is from?",5/24/2018 7:23,,22915,CC BY-SA 4.0 +28859,18086,1,@IgorSkochinsky I think he meant this sort of snarf: https://en.m.wikipedia.org/wiki/Snarfing,5/24/2018 7:34,,22915,CC BY-SA 4.0 +28861,18086,0,"@ElianKamal thanks, I didn't know this term",5/24/2018 7:46,,60,CC BY-SA 4.0 +28863,18345,1,wow. Didn't know you can r2pipe to a web server. Good to know that!,5/24/2018 9:23,,18014,CC BY-SA 4.0 +28868,18035,0,"It depends on the class hierarchy. Yes the first 3 methods in ppv are always QueryInterface, AddRef and Release due to all COM classes are derived from IUnknown. If the class is derived from IDispatch (which is derived from IUnknown), then there's going to be GetTypeInfoCount, GetTypeInfo, GetIDsOfNames and Invoke. And after those, there will be own methods of the COM class.",5/24/2018 10:29,,22324,CC BY-SA 4.0 +28869,18035,0,Ia asked if the offsets are different in 32bit and 64bit.,5/24/2018 12:22,,23069,CC BY-SA 4.0 +28870,18283,0,Thanks for the reply/update. When i undefined the code it simply replace loc_xxxx with unk_xxxx,5/24/2018 13:30,,24400,CC BY-SA 4.0 +28871,18344,0,"You is genious, f*cking great!!! Can i use this script on Windows system?",5/24/2018 13:43,,24477,CC BY-SA 4.0 +28873,18035,0,"Yep, these ppv items are pointers, so in 32bit code the offsets will be a multiple of 4, in x64 - multiple of 8. Ex 0, 4, 8 vs 0, 8, 0x10 etc.",5/24/2018 14:31,,22324,CC BY-SA 4.0 +28874,18351,0,"@w s Thank you for the help; I realised my mistake. Say, can you convert a string into an integer in IDC? eg. from '1510' to 1510?",5/24/2018 15:31,,24485,CC BY-SA 4.0 +28875,18351,0,"@w s Nvm, got it. Use 'atol' command.",5/24/2018 15:42,,24485,CC BY-SA 4.0 +28876,17798,0,Glad to see you on this SE site. I admire your RCE and forensics related work.,5/24/2018 18:59,,245,CC BY-SA 4.0 +28878,18340,0,"@igor-skochinsky Thanks for your comment. Your question is a great one and I'm not sure I have a full answer. I CAN `stepi` into `system@plt` - however, once I'm in `system@plt` I can nexti through it, however GDB will not allow me to `disass system@plt` - when I try it responds `No symbol ""plt"" in current context.` - not sure if that's because there is something special about system@plt or it is because something is wrong. I can attach a screen cap if needed. Thank you!",5/24/2018 22:31,,24160,CC BY-SA 4.0 +28879,18340,0,"@elian-kamal Thank you for your comment! Running gdb as root gets the same non-result. No shell is launched. This is a challenge from the Recruit CTF series, which is a fantastic (but fairly tricky) intro series.",5/24/2018 22:34,,24160,CC BY-SA 4.0 +28881,16407,0,"Good answer, “overlay” is a term from MSDOS days and used to mean exactly this. Malscan author is probably old :-)",5/25/2018 4:09,,23656,CC BY-SA 4.0 +28882,18357,0,"What's the basis for the question? As is, it is a bit odd, so maybe if you explain your motivation it's possible to give a more helpful answer. If code is PIC, you usually see some typical patterns like `call $+, pop` to get the current address, or `call xxx, pop` to push some address on the stack.",5/25/2018 6:21,,23277,CC BY-SA 4.0 +28883,18344,0,"Yes, a basic Python 3.x installation will run the script but you need to adjust some things. The `php_eval` function also expects PHP to be installed and callable as just `php somefile.php` from the command line. It also uses a Linux path `/tmp/eval` for its temporary file which you would need to adjust, just point it somewhere it may write.",5/25/2018 6:25,,23277,CC BY-SA 4.0 +28884,18357,0,@JohannAydinbas I don't really have a reason... I was just trying to understand the differences between ET_DYN and ET_EXEC(compiled with -fPIC) and that made me wonder whether I could detect this kind of thing,5/25/2018 6:25,,14535,CC BY-SA 4.0 +28886,18353,1,your question is unclear... what specifically you want to achieve?,5/25/2018 7:52,,60,CC BY-SA 4.0 +28890,18362,0,"For some reason I cant show exported functions, I tried with `!showexports KERNEL32` and `extmatch /D /e KERNEL32 *` it just doesnt do anything",5/25/2018 12:51,,24514,CC BY-SA 4.0 +28893,18340,0,"@IgorSkochinsky Thanks again for your comment. I was able to `stepi` into `system` and it actually seems a bit strange. When you `disass system`, you see: `Dump of assembler code for function system@plt: +=> 0x08048390 <+0>: jmp *0x804a014 + 0x08048396 <+6>: push $0x10 + 0x0804839b <+11>: jmp 0x8048360` - however the odd thing is that the last `jmp` to `0x8048360` seems to go nowhere. GDB only returns `0x08048360 in ?? ()` and `No function contains specified address.` - which seems odd?",5/25/2018 16:12,,24160,CC BY-SA 4.0 +28894,18363,0,show the corresponding asm,5/25/2018 18:23,,60,CC BY-SA 4.0 +28897,18363,0,it appears like highpart(qword( x) = var; lowpart(qword(x) - another var;,5/25/2018 19:36,,3473,CC BY-SA 4.0 +28899,18340,0,@BronzeOtter this is normal when you don’t have symbols,5/25/2018 19:51,,60,CC BY-SA 4.0 +28900,18364,0,"After splitting `v175 = __PAIR__(1, (unsigned int)handle[0]);` becomes `HIDWORD(v175) = 1; LODWORD(v175) = handle[0];`.",5/25/2018 19:54,,23069,CC BY-SA 4.0 +28901,18364,0,"yes, because the stkvar is still a 64-bit integer but high and low parts of it are being accessed separately.",5/25/2018 20:03,,60,CC BY-SA 4.0 +28902,18363,0,nothing take a look at _LARGE_INTEGER structure and see the low part and high part and also as a qword,5/25/2018 20:20,,3473,CC BY-SA 4.0 +28904,18366,0,add the call to the disassembly,5/26/2018 9:50,,60,CC BY-SA 4.0 +28905,18340,0,@BronzeOtter: How do you inject your overflow ? Through `argv[]` or through `stdin` ? If it is though `stdin` you might miss way to keep open the stream to the vulnerable program.,5/26/2018 10:05,,53,CC BY-SA 4.0 +28906,18365,0,"I think it depends on the exact situation, can you post an example?",5/26/2018 10:30,,1842,CC BY-SA 4.0 +28907,18326,0,Current versions of Windows have an algorithm that is slightly smarter than just XOR because it was easy to break if you had both the plain and obfuscated pointer.,5/26/2018 12:12,,2221,CC BY-SA 4.0 +28909,18366,0,@IgorSkochinsky edited it in,5/26/2018 15:52,,24523,CC BY-SA 4.0 +28910,18368,0,Could you provide the assembly code of the referenced memory location?,5/26/2018 19:14,,22915,CC BY-SA 4.0 +28911,18368,0,"@ElianKamal, added it.",5/26/2018 21:07,,24467,CC BY-SA 4.0 +28912,18365,0,"@WillemHengeveld it's a pretty long function, but here: https://gist.github.com/Zhentar/d65a0bbdcd489719cbec7b0b00761f85 +a3a, a4a, time, and time_1 are ones that I've noticed that seem to be aliased",5/26/2018 21:28,,24523,CC BY-SA 4.0 +28913,18369,0,"This is x86-64, so it's it's expecting the first argument to be in rcx whether or not it's `this`. I tried manually defining the registers ( `bool __fastcall XPerfAddIn__CFramesInfoSource__MatchEventDescriptor(_EVENT_DESCRIPTOR *a2, _EVENT_DESCRIPTOR *a3, EDVersionCheckType a4)`) , but that just gave me the error ""Argument location rdx is not allowed here""",5/27/2018 0:00,,24523,CC BY-SA 4.0 +28914,18373,0,"Have you read the last paragraph of my answer? Also, a workaround should be a different question, this question is about identifying the cause of such call and both answers cover it.",5/27/2018 5:24,,22915,CC BY-SA 4.0 +28915,18373,0,"@ElianKamal, yes, see the updated answer.",5/27/2018 5:43,,24467,CC BY-SA 4.0 +28917,18030,0,"For those who want to disassemble a COM interface, load PDB file in IDA. This helps me to disassemble it. Also you may use simple structs within structs as a inherited class.",5/27/2018 8:32,,23069,CC BY-SA 4.0 +28918,18374,0,"Maybe load it as a binary file, and then split into segments using a bit of .py or .idc script.",5/27/2018 8:46,,1842,CC BY-SA 4.0 +28919,18365,0,I usually add structs with unions to make the output slightly more readable when the compiler has reused a stack slot for different variables.,5/27/2018 8:55,,18521,CC BY-SA 4.0 +28920,18332,0,Which game is it?,5/27/2018 9:50,,2221,CC BY-SA 4.0 +28921,18369,0,explicit argument locations only work for `__usercall`,5/27/2018 17:56,,60,CC BY-SA 4.0 +28922,18340,0,@perror Thank you for the comment! The overflow uses `stdin` - I too was wondering if I was missing a way to reach the shell once it's launched. How does one go about doing that when not using shell code? Any pointers? Thanks again!,5/27/2018 20:31,,24160,CC BY-SA 4.0 +28923,18367,0,"Was thinking about this as well. Problem is that the challenge in this case is to point execution to a `give_shell` function that calls `system` and supplies the correct argument to open a shell. Calling the `system` function directly would leave it without the correct argument, correct? Thank you!",5/27/2018 20:33,,24160,CC BY-SA 4.0 +28924,18340,1,You can read this [answer](https://reverseengineering.stackexchange.com/questions/13928/managing-inputs-for-payload-injection). Everything should be in it.,5/27/2018 20:35,,53,CC BY-SA 4.0 +28926,12392,0,Here the link is still alive!,5/27/2018 21:16,,12800,CC BY-SA 4.0 +28927,18340,0,"@perror FANTASTIC. That covered everything. I'd suspected that this was the problem, but was unable to find the right resource for the information on how to access the shell. Thank you. I'd like to move this over to an answer - how to I make sure you're credited for the answer and not me?",5/27/2018 21:34,,24160,CC BY-SA 4.0 +28928,18340,0,"If the question and the answer I pointed are suitable to you, vote for it. This will be enough.",5/27/2018 21:38,,53,CC BY-SA 4.0 +28931,18365,0,@LéoLam you should post that as an answer so I can accept it :),5/28/2018 3:06,,24523,CC BY-SA 4.0 +28932,12392,0,"It's about the link in the question (not your comment :D), it claims ""File not found"" for me.",5/28/2018 6:09,,6957,CC BY-SA 4.0 +28934,18349,0,"I tried your IDC command, but have the same problem. First: + ""The range 00000000000FB050..0000000000100000 contain instructions/data. Do you want to remove these instructions?"" + +If I choose yes, all work in the new segment part is lost. If I choose no: + + ""Create a segment (00000000000FB050-0000000000100000, sel 0000000000000000): can't trim the previous segment."" +(the previous segment is at F0000-100000)",5/28/2018 6:36,,24499,CC BY-SA 4.0 +28935,18349,0,"if you are browsing a 80186 rom, why do you post addresses as 64 bit (16 hexdigits ) numbers?",5/28/2018 6:42,,1842,CC BY-SA 4.0 +28936,18349,0,"I must say that i never tried this command on a segmented architecture, i know it works fine in flat address spaces. Can you maybe post a link to the rom, so i try it for myself?",5/28/2018 6:43,,1842,CC BY-SA 4.0 +28937,18349,0,That's how I get them from IDA. Maybe I've goofed when first importing the binary?,5/28/2018 6:43,,24499,CC BY-SA 4.0 +28938,18349,0,I've added it to the original post now.,5/28/2018 6:49,,24499,CC BY-SA 4.0 +28939,18349,0,"i loaded the file with all the defaults from IDA, and split the segment at 0xFFF0 - see https://imgur.com/a/jiFTYA3 this seems to work just fine",5/28/2018 6:59,,1842,CC BY-SA 4.0 +28940,18349,0,"When i tried to load initially at a different offset, IDA did have problems with splitting.",5/28/2018 6:59,,1842,CC BY-SA 4.0 +28941,18349,0,"Oh, and did you load this as a 16 bit binary? the 80186 is a 16 bit processor.",5/28/2018 7:00,,1842,CC BY-SA 4.0 +28942,18349,0,"I did add it as a 16-bit binary. Indeed adding segments works when I load it on default settings (though this loads the code at the wrong address), but then I tried adding some names and comments before adding another segment - and get the same issue. As soon as I've edited a segment, I can't move it anymore.",5/28/2018 7:09,,24499,CC BY-SA 4.0 +28944,18381,0,It would be a lot better to post the text form here. Images still can't be indexed the same as plain text by search engines.,5/28/2018 7:44,,245,CC BY-SA 4.0 +28945,17527,0,"@Fewmitz: if this is live malicious code, running it in a debugger without further precautions is actually a pretty bad idea.",5/28/2018 7:59,,245,CC BY-SA 4.0 +28946,18371,0,You should take a look to https://www.capstone-engine.org/,5/28/2018 8:18,,111,CC BY-SA 4.0 +28947,12392,0,"In case you mean the link to CWinThread in the question, it's still intact here.",5/28/2018 11:45,,12800,CC BY-SA 4.0 +28948,12392,0,"Very weird. To me it just replies ""Sorry, the requested URL path ""/windows/misc/winscp577source.zip"" was not found on this server.""",5/28/2018 11:46,,6957,CC BY-SA 4.0 +28949,12392,0,Strange... The link is:https://msdn.microsoft.com/en-us/library/48xz4yz9.aspx,5/28/2018 11:48,,12800,CC BY-SA 4.0 +28950,12392,0,"Ok, now I found the link you are talking about! It is the link of my answer, not the question. This indeed seems to be broken. I'll have a look... Sorry for the confusion.",5/28/2018 11:51,,12800,CC BY-SA 4.0 +28951,18382,0,do you have the program which parses the file?,5/28/2018 11:56,,60,CC BY-SA 4.0 +28952,12392,0,"Thanks, sorry for confusing you about ""Question"" / ""Answer"", it's too hot today... :o)",5/28/2018 12:02,,6957,CC BY-SA 4.0 +28954,12392,1,"No problem, Ray. I searched a little and could not find the sources in the web. However, they are contained in VStudio. I edited the answer accordingly.",5/28/2018 12:33,,12800,CC BY-SA 4.0 +28955,18381,0,"Just a guess, since this is a free-form IOCTL code. `cDc` in the hexadecimal representation of the code kinda makes me wonder if it's a reference to [Cult of the Dead Cow](https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow). But without further knowledge of your target binary that's just a comment I wanted to squeeze in.",5/28/2018 14:21,,245,CC BY-SA 4.0 +28957,18387,0,"Thanks for your reply, seems this is exactly what i was searching for! My question was incorrect, in some way, it was really not the good way to go. There is only one thing left uncovered here - if you afford - please add few words on simple, easy-to-use Checksum calculation method, that you would recommend to use in such situation.",5/28/2018 15:03,,24539,CC BY-SA 4.0 +28959,18387,0,"Thank you very much, that worked. I used [PEChecksum](http://www.coderforlife.com/projects/utilities/#PEChecksum) very simple tool. It just scans and updates, if nesesary. Now i am stuck at 0xc0000428 (seems digital signature check related) and pressing F8-7(disable drivers signature checking) and F8-8(disable antimalware) not worked",5/28/2018 15:17,,24539,CC BY-SA 4.0 +28960,18387,0,@xakepp35: did you use `bcdedit` the way I described? What exact build of Windows 10 is this? 32-bit or 64-bit?,5/28/2018 15:18,,245,CC BY-SA 4.0 +28961,18387,0,win10pro x64. properties tab shows 10.0.14393.0 File version,5/28/2018 15:26,,24539,CC BY-SA 4.0 +28965,18387,0,"Yes. I reinstalled clean system. I used bcdedit with `bootmenupolicy Legacy`, `bootstatuspolicy IgnoreAllFailures`, `disableelamdrivers yes`, `nointegritychecks on`, `testsigning on`. Then i've patched ntoskrnl.exe (connecting ssd to another PC, and changing permissions to Everyone: Full access), and fixed checksum in header. When booting in F8 i tried to select ""disable ELAM"" and ""disable signing"". And still getting 0xc0000428 digital signature check error on ntoskrnl.exe file...",5/28/2018 17:21,,24539,CC BY-SA 4.0 +28966,18386,0,"Thanks so much, this provides a good start on how to approach it.",5/28/2018 17:35,,12793,CC BY-SA 4.0 +28967,18386,0,@fred26 Glad to be of assistance :),5/28/2018 17:38,,22915,CC BY-SA 4.0 +28969,18387,1,"@xakepp35 Fascinating. So a different status. Since you already turned it on, did you prepare your system for test signing and test-signed the changed binary after setting the checksum? Also, have you tried instead to strip the signature from the binary and leave it unsigned (but also leave `testsigning off`)?",5/28/2018 19:06,,245,CC BY-SA 4.0 +28971,18396,0,"A nice link to some place where the questioner could [look up opcodes](http://ref.x86asm.net/) in the future would have been awesome. After all none of this is magic and the question is at the level of ""please do my homework"".",5/28/2018 19:13,,245,CC BY-SA 4.0 +28974,18395,0,"Glad it worked for you! I did not use the -F parameter, but did it in the debugger and stopped after the first file. Maybe that's the reason. Nice question btw, never heard about NRV before!",5/28/2018 20:14,,12800,CC BY-SA 4.0 +28975,18395,0,"How did you know that NRV is still a part of UPX/UCL from Oberhumer? And how did you come up with the header, from the sources?",5/28/2018 21:32,,24536,CC BY-SA 4.0 +28976,18395,0,"No magic at all: Q1: Oberhumer writes it on his website http://www.oberhumer.com/opensource/ucl/: ""UCL is an OpenSource re-implementation of some NRV compression algorithms."" Q2: Without any header, running in the debugger leads you to a point where the program tries to read the header and exits with an error. Analysing the source, you insert the header in the way as to avoid that error. You iterate this way until all ""header"" errors have been satisfied. Straightforward.",5/28/2018 21:54,,12800,CC BY-SA 4.0 +28979,18381,0,@Biswapriyo what i'm trying to know is what are the possible inputs so that the `DeviceIoControl` function does not return a null value,5/28/2018 23:47,,24230,CC BY-SA 4.0 +28980,18381,0,"thank's for the additional informations @0xC0000022L , if this might help; the binary is a CTF challenge that loads a kernel driver and uses it to check if the flag is correct or not, and the only variable that goes to this function and I have control over is `[ebp+buffer]`",5/28/2018 23:53,,24230,CC BY-SA 4.0 +28981,18367,0,"When doing a ret2libc exploit, if you provide the the stack looking like this, you will be able to get a shell:",5/29/2018 1:13,,24526,CC BY-SA 4.0 +28982,18367,0,#NAME?,5/29/2018 1:14,,24526,CC BY-SA 4.0 +28983,18382,0,"Hello again, @IgorSkochinsky - great to hear from you. For the challenge, we essentially just got an address to connect to with NetCat. On connection, the server transmitted the file contents. No shell, just that data response. The connection is closed at EOF with this `...?Enter/Right/P?p9LPi?Wh Enter/Right/readme.txtPK00+? +End Transmission` My initial guesses are that either the flag is encoded in the file, or the file contains instructions on where to get the flag.",5/29/2018 1:34,,24160,CC BY-SA 4.0 +28984,18382,0,"I had previously suspected that the file was an MP4 container due to this line: `Enter/Down/readme.txtAnd the path, to you, remains clear. +PKÓp9LÿW”2µ +Enter/map.mp4”÷’’FC\5` but it doesn't seem to be correctly formatted",5/29/2018 1:36,,24160,CC BY-SA 4.0 +28985,18383,0,"I had suspected something like that. But that leads to two questions - first, there are also many references to `/Right/` - which doesn't seem to make sense if it refers to a path. Secondly, there's no address that leads to a shell or directory structure (see above) - all we're given is that data. I do suspect there might be a location to connect to hidden in the file, but am not sure on how to follow up on that...",5/29/2018 1:38,,24160,CC BY-SA 4.0 +28989,18394,0,did you try to look up this instruction in any documentation?,5/29/2018 9:15,,60,CC BY-SA 4.0 +28997,18394,0,"If you are using IDA, you can turn on Auto comments, this option will explain some ""basic information"" for you. The answer for this question is @Henno Brandsma's response!",5/30/2018 2:21,,3737,CC BY-SA 4.0 +28998,18382,3,"PK is more like a magic number for ZIP file, which could inside contain an mp4.",5/30/2018 3:45,,18014,CC BY-SA 4.0 +28999,18401,0,"Thanks, that did the trick. To clarify, when you say ""usually the code needs to be recreated if the segment base changes"" - what are the potential risks of sneaking the segment base change in like this?",5/30/2018 10:56,,24499,CC BY-SA 4.0 +29000,18401,1,"@esrever some xrefs, especially those based on current segment/CS may need to be recreated",5/30/2018 11:01,,60,CC BY-SA 4.0 +29005,11108,0,"Hey, just from curiosity. Is SoftICE still around? Or is it just an old question. I remember using it back in the 90's.",5/31/2018 5:48,,14864,CC BY-SA 4.0 +29006,18413,0,"Okay I get it, but why add 0FFFFFFF0h and not 0FFFFFFF0F if we want to clear the lower nibble?",5/31/2018 9:48,,23314,CC BY-SA 4.0 +29007,18413,1,lower nibble are the bits `3-0` so why we would want to put 0 on bits `7-4` to do that?,5/31/2018 9:53,,18014,CC BY-SA 4.0 +29008,18413,0,"I missread, sorry",5/31/2018 10:01,,23314,CC BY-SA 4.0 +29009,18412,0,and not add aligns the stack to 16 byte boundary ie 123456a1 & fffffff0 will result in 123456a0,5/31/2018 10:14,,3473,CC BY-SA 4.0 +29010,18410,0,how are you stepping using t or p p allows free execution try to stick to t or use a process specific bp one time bp on next instruction prior to p,5/31/2018 10:17,,3473,CC BY-SA 4.0 +29011,18410,0,@blabb what do u mean? I couldnt catch you,5/31/2018 10:20,,24485,CC BY-SA 4.0 +29012,18413,0,"ok, no worries!",5/31/2018 10:22,,18014,CC BY-SA 4.0 +29013,18409,2,"Decompilers exist, yes, for many different CPUs. But they're not perfect, and you'd need to understand how the code interfaces with the platform the ROM is built into if not standard, and chances are it'll take a fair amount of effort and expertise to get you something useable, depending on what level of fidelity you want and what you're trying to do with it.",5/31/2018 11:27,,13139,CC BY-SA 4.0 +29014,18410,0,"@Kyoma: how do you ""step into assembly""? what exact command/hotkey are you using?",5/31/2018 17:33,,60,CC BY-SA 4.0 +29015,18412,0,Isn't there a risk of loosing data?,5/31/2018 18:49,,23314,CC BY-SA 4.0 +29016,18362,0,@DanielIsraeli are you doing user mode debugging or kernel mode debugging !showexports will show no output if you are doing kernelmode debugging and the symbols are not loaded for the module in user mode iirc the command loads the sysmbols for the module automatically,5/31/2018 19:35,,3473,CC BY-SA 4.0 +29017,18403,0,"Thanks, I see how capstone can parse it as well.",5/31/2018 20:38,,12793,CC BY-SA 4.0 +29018,18410,0,@IgorSkochinsky F11,6/1/2018 0:19,,24485,CC BY-SA 4.0 +29020,2007,0,"*""I had not noticed before, but you're using the notation %fs, not FS, so probably you're meaning Linux""* the question now is specific to linux, I'm not sure it was when you answered, perhaps the answer should be refined too?",6/3/2018 0:06,,22669,CC BY-SA 4.0 +29021,18428,0,"I'll just note that you should be extremely careful about the legth of the instructions. Even stuff that looks trivial might be dangerous, like operand override (0x66) when using eax instead of ax",6/3/2018 1:03,user22970,,CC BY-SA 4.0 +29026,18431,0,Exactly that was the problem. Why on Earth would some not want to be in sync? Thank you so much.,6/3/2018 7:15,,13634,CC BY-SA 4.0 +29027,18431,4,"Glad it helped :) Imagine, for example, reading an assembly code in the IDA View that manipulates an array of bytes in another address. One might want to see the assembly in the IDA View and at the same time to open the Hex View on this structure of bytes.",6/3/2018 7:17,,18698,CC BY-SA 4.0 +29028,18431,0,Makes sense :-),6/3/2018 9:31,,13634,CC BY-SA 4.0 +29030,18435,0,Here is the link to those class files - https://www80.zippyshare.com/v/TsPZe3M8/file.html I need to delete the private static bytes & include new array bytes. The old already patch file is also there which bytes need to replicate in the new classes. My request to you please let me know how can I change it by myself so that I can do it in later onwards.,6/3/2018 14:08,,24368,CC BY-SA 4.0 +29031,18433,0,question body seems to be different from title,6/3/2018 14:10,,60,CC BY-SA 4.0 +29033,18433,0,rephrased question body,6/3/2018 16:02,,24594,CC BY-SA 4.0 +29034,18433,0,"you're still asking two different things: ""what is `__return_ptr`?"", and ""how to represent this calling convention in IDA?"". But okay, I'll try to describe both parts.",6/3/2018 17:26,,60,CC BY-SA 4.0 +29037,18419,0,"Hi, thanks for the code. It produces the correct number of nodes, but the edge count seems to be incorrect when compared to the that produced by wingraph32. Why do you recommend Proximity Viewer though? It doesn't seem to give me the CFG.",6/4/2018 0:50,,15717,CC BY-SA 4.0 +29038,18419,0,"I went back to reran your code on smaller graphs so I can actually count the number of segments and compare it to what Flowchart was giving me. It seems your output is correct, while Flowchart is giving me a way higher edge count (even 1 edge is reported as 2 edge). Flowchart does count ""edge segments"" though, is this different from number of edges?",6/4/2018 0:57,,15717,CC BY-SA 4.0 +29039,18435,0,What bytes do you need to add? I can see if I can do it and then post step by step how I did it.,6/4/2018 2:34,,1739,CC BY-SA 4.0 +29042,2007,0,"at the time i wasn't programming in asm from years, as of now i remember even less being shifted to c# +also i have not really programmed in linux much +i couldn't really add much",6/4/2018 6:57,,1923,CC BY-SA 4.0 +29043,18419,0,"IIRC, the FlowChart will take into account function chunks. Perhaps @igorsk knows better.",6/4/2018 7:31,,111,CC BY-SA 4.0 +29045,18435,0,"Thanks for your suggestion to use Krakatau & I disassemble the class files & done the changes & then assemble the file again. It works for only one class file. Though the other two class file changes the file size. I have noticed one thing that disassembling original class file with ""Krakatau"" & assemble it back make the changes. & running it with ""javap -c"" shows lots of difference. Attachment link - [www7.zippyshare.com/v/diNNVsTz/file.html]",6/4/2018 12:28,,24368,CC BY-SA 4.0 +29046,18442,2,"Yes _and_ no. If all of the parameters are stored in a straightforward fashion you may be in luck. But there's a myriad of ways to hide and obfuscate facts. So while - in principle - what you're asking is possible, it's going to be tough to be certain that you caught all of the possible parameters. Specifically because on Windows there exist a multitude of ways to fetch the command line arguments at any time. So this is a bit of a broad question.",6/4/2018 13:24,,245,CC BY-SA 4.0 +29048,18451,0,At the moment I'm thinking byte level VAEs/LSTMs for upper part.,6/4/2018 13:38,,24606,CC BY-SA 4.0 +29050,18445,2,please spend some time editing this post so it's a bit more polished. Not sure if this link with number 4 at the end of the post is valid or a mistake.,6/4/2018 16:11,,18014,CC BY-SA 4.0 +29051,18436,0,At least on my machine gcc does pass the result on the stack even with the 4-byte struct (gcc (Ubuntu 7.3.0-16ubuntu3) 7.3.0). But the last sentence answers my question,6/4/2018 16:38,,24594,CC BY-SA 4.0 +29052,18435,0,"@Subhashish The default settings are designed for convenience. If you want to ensure there are no changes at the binary level, use `-roundtrip` when disassembling.",6/4/2018 16:53,,1739,CC BY-SA 4.0 +29059,18450,1,more links: https://github.com/eriksoe/Schockabsorber https://github.com/Brian151/OpenShockwave/ http://fileformats.archiveteam.org/wiki/Lingo_bytecode,6/4/2018 21:06,,60,CC BY-SA 4.0 +29062,18455,1,"shortcut is actually Alt-P, at least on Windows.",6/4/2018 21:10,,60,CC BY-SA 4.0 +29064,18456,3,It seems you're trying to achieve something else and I feel this may not be the best way to achieve it. You may want to consider describing your end goal and look for alternative solutions.,6/4/2018 21:14,,2147,CC BY-SA 4.0 +29065,18456,0,@NirIzr i already tried many different solutions this is my last solution. I need to override these classes.,6/4/2018 22:50,,24593,CC BY-SA 4.0 +29066,18457,0,"That's pretty much what I was looking for, I was just hoping that somebody came up with something better than HMMs. +At the moment I have written simple fuzzer that generates random http packets and gonna test few models trying to learn underlying structure. Thanks for the link.",6/4/2018 23:28,,24606,CC BY-SA 4.0 +29068,18456,0,@Mustafa Adeniz Are these class methods virtual ?,6/5/2018 6:07,,2318,CC BY-SA 4.0 +29072,18459,0,"Yes, that's a good idea, the obfuscator can be made to store the ""mapping"" during the obfuscation process.",6/5/2018 8:37,,24615,CC BY-SA 4.0 +29075,18456,1,"@MustafaAkdeniz: seriously, Nirlzr is right. If you (also!) described what you want to achieve rather than prescribing a particular method, we would be in a better position to help. Just because this is your last straw doesn't mean there aren't better ways to achieve what you want. Why else would you be asking here?",6/5/2018 8:49,,245,CC BY-SA 4.0 +29078,18461,0,"[This](https://github.com/merbanan/rfid_app/blob/master/sycreader_set.c) C code may be useful, but I'm not quite sure what it does and how to extend the command set.",6/5/2018 10:28,,22389,CC BY-SA 4.0 +29080,18435,0,"Your suggestion solved the problem. Thank you. The program is working fine now but after 20min the software crash automatically, because heap dump shows memory leak but I don't able to fix it. can you please take a look at this program & rectify the issue if possible. I'll be highly thankful to you. Link - www25.zippyshare.com/v/i6aYoIso/file.html",6/5/2018 11:25,,24368,CC BY-SA 4.0 +29081,18444,0,"Is that a situation you have experienced yourself ? Your analysis appears sound to me, but with the widespread use of Unicode I can't help but wonder how this isn't a largely discussed issue, and how it could exist in such an iconic software in the first place.",6/5/2018 15:44,,24597,CC BY-SA 4.0 +29082,18438,0,"I tried your second method but the mutex is still there, it just have a brand new name :o. Anyway, I'm just gonna nop some stuff near the mutex call ans see how it goes. Thanks for your answer! :)",6/5/2018 17:52,,23595,CC BY-SA 4.0 +29084,18462,1,"Yes, you should learn about MFC if you would like to reverse engineer MFC applications. Voting to close as off topic because OP clearly did not spend the time to investigate the material he's asking about.",6/5/2018 19:16,,2147,CC BY-SA 4.0 +29085,18456,0,"@malikcjm thank you, this was all i need to know.",6/5/2018 20:50,,24593,CC BY-SA 4.0 +29087,18462,1,"Frankly, both will be necessary and helpful in the long run. If you deal with the Win32 subsystem, knowing about the Win32 API is an excellent preparation for reverse engineering WTL or MFC based applications. Knowing about those frameworks in turn will help you identify patterns and leave the unimportant stuff alone. **NB:** if I understand you correctly you are trying to gauge if the program uses MFC or pure Win32 based purely on the static imports. That's not possible. You might want to amend your question to include _actual_ bits of disassembly.",6/5/2018 20:59,,245,CC BY-SA 4.0 +29088,17894,0,"Yes, ollydbg, like incode said can do the job. You have a lot of disassemblers, the best is probably IDA (free and premium version).",6/5/2018 21:11,,23595,CC BY-SA 4.0 +29089,18465,1,"When calling a function, some arguments are pushed fo the stack and someone need to pop them for the program to keep it's execution correctly. That some is ""decided"" by the calling convention, it can be the caller, it can be fhe callee. Winapi uses the `stdcall` which states that the callee clears the stack from the arguments. Insted of poping x number of times to get rid of the argument, a `ret n` is performed. It basically remove n ""variables"" from the stack before returning. Without it, the program will execute incorrectly",6/5/2018 21:25,user22970,,CC BY-SA 4.0 +29093,18466,0,@Biswapriyo The last paragraph discusses the task of actually simplifying those names but as mentioned I personally find it redundant.,6/5/2018 21:50,,2147,CC BY-SA 4.0 +29095,18466,0,"@Nirlzr: may be a worthwhile endeavor parsing the for `typedef` occurrences that are specializations of the standard containers and use an IDAPython script or plugin to make the names more readable. But yeah, it looks kind of like a tedious task. It'd probably require some proper C++ parser like `libclang` in the first place.",6/5/2018 21:53,,245,CC BY-SA 4.0 +29096,18466,0,"@0xC0000022L Not sure about the c++ parsing, because these function names are not really free strings but compiler-mangled names. There are slight variations between compilers (which IDA already support, obviously) but basically I think it is structured enough for you to not need a actual C++ parsing, at least on the plugin's side. I believe you could also scrape some DBs or websites to get the default values without doing any c++ parsing either. YMMV and I didn't go into details because I don't thing anybody should be wasting their time on that, tbh.",6/5/2018 21:58,,2147,CC BY-SA 4.0 +29097,18466,0,@Biswapriyo I also went into details in here for anyone that is not familiar with the std and has trouble reading the function names. Goal was not to explain that one name you provided but show how std/template names are built and how they should be interpreted by the unfamiliar reader.,6/5/2018 21:59,,2147,CC BY-SA 4.0 +29098,18466,0,"@NirIzr: I was referring to the part where one sifts through the STL headers, looking for `typedef` instances that look akin to `typedef basic_string wstring` for any number of container classes. Because that's where the short names come from (`std::string`, `std::wstring` etc) and where the defaults will be known (provided you can parse C++). With libclang it's really a lot easier than it used to be (e.g. trying to parse the XML AST output from GCC).",6/5/2018 22:01,,245,CC BY-SA 4.0 +29099,18466,0,"@0xC0000022L yea, that's where I said there's probably a parsed DB or you could parse a website like the std reference. It could very well be easier to use libclang - I've never used it so I wouldn't know.",6/5/2018 22:04,,2147,CC BY-SA 4.0 +29100,18465,1,"I would like to offer another potential alternative, depending on what exactly the namespace of the mutex is. + +A mutex, just like drive letters can be global or local. So *if* you are trying to run multiple instances of said application in different sessions *and* the application uses a name of the form `L""Global\\MutexName123""` you could patch the name to `L""Local\\MutexName123\0""` in your binary (the `\0` is a result of the length difference between `Global` and `Local`). + +See: MSDN documentation on [Object Names](https://msdn.microsoft.com/en-us/library/windows/desktop/ms684292.aspx)",6/5/2018 22:09,,245,CC BY-SA 4.0 +29101,18444,0,"Yes I've seen this multiple times. As for iconic ... there are so many bugs, which are not fixed for decades :)",6/6/2018 7:37,,22324,CC BY-SA 4.0 +29102,18467,2,Could you please copy and paste the disassembly instead of posting screenshots? It'd really help others in the future as it improves indexing by search engines. Thanks!,6/6/2018 9:56,,245,CC BY-SA 4.0 +29103,18468,1,Key word: unrolled loop. Probably an inlined `memmove` (or `strcpy`).,6/6/2018 9:57,,245,CC BY-SA 4.0 +29104,18445,2,"I'm with Paweł. Please make sure specifically not to include purely screenshots. The first and second screenshot could easily be replaced by a code block, which would aid search engines trying to index our site. The reason I ask _you_ to do it, is because you only have to copy & paste. However, I or anyone else would have to sit down and type down what's seen on the screenshots.",6/6/2018 10:03,,245,CC BY-SA 4.0 +29106,18467,1,apologies for not being clear in my comment. I meant that you should *edit* your own question to replace the screenshots with the textual form. For this question this would seem to apply to both screenshots. Thank you.,6/6/2018 10:39,,245,CC BY-SA 4.0 +29107,18457,2,You should take a look to 'radamsa'. It tries to infer the grammar from the data you give to it and then generate outputs according to the inferred grammar.,6/6/2018 15:10,,111,CC BY-SA 4.0 +29108,18468,0,"@0xC0000022L does it have to be, though? I think it can also be a direct assignment, say `char a[] = ""this is a string"";`, no?",6/6/2018 16:18,,2147,CC BY-SA 4.0 +29110,18467,0,previous discussion on this optimization: https://reverseengineering.stackexchange.com/questions/10839/,6/6/2018 19:10,,60,CC BY-SA 4.0 +29111,18465,0,"Thanks amirag :). And your idea is cool 0xC0000022L. Do you think I could change the mutex name to ""Local\\[Restofmutexname]"" even if it is not Global\\ before?",6/6/2018 23:04,,23595,CC BY-SA 4.0 +29112,18432,1,Please describe in greater detail what you are trying to achieve and what problem you are having. The description provided is not very clear.,6/7/2018 0:20,,18317,CC BY-SA 4.0 +29115,18455,4,"Since 7.1, IDA also provides tooltips for those arguably cryptic single-letter columns. Just hover your mouse over the column header for a couple seconds, and the tooltip should appear.",6/5/2018 5:58,,17133,CC BY-SA 4.0 +29116,18456,1,@malikcjm can you please put it in the answer box for future visitors?,6/7/2018 7:46,,60,CC BY-SA 4.0 +29117,18472,0,"`std::string` is a name for the `char`-*specialization* of the `std::basic_string` template class. And while it can be statically linked, it is also provided as a function by the `libstdc++6.so` as evidenced by running `readelf --dyn-syms /usr/lib/x86_64-linux-gnu/libstdc++.so.6|awk '$4 ~ /^FUNC/ {print $8}'|cut -d @ -f 1|c++filt|grep 'std::basic_string