Most Popular

1500 questions
11
votes
1 answer

Tracing message passing instead of a call stack

In a microkernel, much of the interesting functionality happens not with traditional function calls, but instead through message passing between separate entities. Is there a structure that OS architectures like this generally use to implement…
11
votes
2 answers

Debugging EXE with TLS

How do I debug an executable that uses TLS callbacks? It's my understanding that these run before my debugger will attach.
mrduclaw
  • 4,066
  • 8
  • 27
  • 40
11
votes
1 answer

Are the EU laws preventing reverse engineering of software products?

Would it be legal to decompile and/or reverse engineer a commercial java JAR file to view the inner workings of a library in order to write original code for use with the library in the EU or UK?
Jesson Atherton
  • 213
  • 2
  • 7
11
votes
2 answers

Immunity Debugger reset windows to default tiling

I have changed the windows from the original tiling layout in Immunity Debugger. I would like to restore the original tiling. I have tried restarting the program but the modified tiling remains. Is there a procedure for restoring the original…
Concklin F
  • 111
  • 1
  • 1
  • 3
11
votes
1 answer

Randomly picking up a x86 register for an instruction

I came around a piece of malware which i am analyzing and have found that it uses some kind of math to randomly selecting a register for a specific instruction Which i don't understand how this operation is calculated depend on what? Here is an…
RCECoder
  • 314
  • 1
  • 6
11
votes
1 answer

Get code from protected PIC

I have a PIC18F4550 from an old device and I need to see the code. I tried reading it using my ICD3 programmer, but the chip seems to have its code protected. How can I get the code anyway?
user187
11
votes
4 answers

Best alternatives to IDA Pro, Immunity and OllyDbg for a blind user

I am totally blind and want to learn to do reverse engineering so I can advance my career. Unfortunately, IDA Pro, Immunity and OllyDbg are all not accessible to a blind person using a screenreader. Are there any good alternatives on both windows…
dnraikes
  • 379
  • 5
  • 11
11
votes
2 answers

nop with argument in x86_64

A program I'm investigating has the following code (disassembled by IDA with some light censorship by me): __text:....B9 call __text:....BE nop __text:....BF nop dword ptr…
Brennan Vincent
  • 293
  • 1
  • 2
  • 9
11
votes
2 answers

Decrypting IPA Binary on OS X

I've been reading this PDF on reverse-engineering iOS applications and have reached slide 39, decrypting the binary. However, I've been attempting to disassemble and explore the binary in OS X 10.9.5 rather than iOS, since my phone is not jailbroken…
Patrick Roberts
  • 269
  • 1
  • 2
  • 10
11
votes
3 answers

ZTE encrypted backup config file

I was poking around in ZTE Speedport Entry 2i (CPE used mostly in Germany, Slovakia etc, probably custom made for Deutsche Telekom). It's possible to download backup of config from UI. I found out it's different from other ZTE config backups.…
J91321
  • 271
  • 1
  • 2
  • 8
10
votes
1 answer

Extracting arguments from IDA

Let's say I have the following function in IDA: int __usercall function(char* message, unsigned int count) What's the fastest way to extract the argument information using IDAPython, such that I get the following: [['char*',…
Zach Riggle
  • 2,337
  • 1
  • 16
  • 28
10
votes
2 answers

How to bypass ZwContinue?

During an analysis, I have found a call to ZwContinue. The executable file first gets the address of ntdll.NtContinue and stores it in the EAX register. After I step over the following assembly line, CALL EAX ; ntdll.ZwContinue then OllyDbg…
user3097712
  • 1,541
  • 1
  • 25
  • 44
10
votes
2 answers

How do you can you disassemble and dump an entire binary?

It's easy to seek to a particular function and dump it's contents as Assembly language. However, I cannot find an obvious way to immediately disassemble and dump an entire binary. I want to use it more like I use IDA and objdump by seeing the entire…
MrSynAckSter
  • 1,258
  • 1
  • 10
  • 24
10
votes
1 answer

Anti-debugging techniques - Preventing me from setting a memory and hardware breakpoint. How can I bypass that?

I'm debugging this process which has a lot of anti debugging techniques in it, and I faced something new which I don't know how to bypass yet. Changing the code dynamically causes exceptions to occur and the process to crash. So setting INT 3…
0xAK
  • 668
  • 6
  • 19
10
votes
1 answer

RS-485 Checksum Reverse Engineering (Watlow EZ-Zone PM)

I am trying to reverse engineer a two wire RS-485 standard serial bus interface to talk to a Watlow EZ-Zone PM of which I have not been able to find any documentation of the protocol. I have managed to figure out most of the hex commands except for…
Onlyjus
  • 203
  • 2
  • 7