Most Popular

1500 questions
10
votes
2 answers

What impact does noninvasive debugging have?

What impact does noninvasive user mode debugging with WinDbg have on the process? Will it be detectable by the process? Of course I could imagine that if the threads are suspended, differences in execution time of a function could be detected by…
Thomas Weller
  • 970
  • 6
  • 19
10
votes
1 answer

Mapping an external module's source code to assembly - extracting information from source code

The situation is the following: I'm reversing an application, In which I found a lot of functions that belongs to the OpenSSL library. Since I have the source code for this module, I was wondering if it's possible to somehow "extract" the variable…
Dominik Antal
  • 2,038
  • 22
  • 39
10
votes
3 answers

Converting a virtual table from .rdata into an IDA struct

Is there a way to convert a .rdata vtable entry to an IDA struct? An example of the vtable entry: And what the resulting struct should look like (but with all entries - this vtable specifically, should have 109 vfuncs): I would assume there's some…
Jarryd Le Breton
  • 101
  • 1
  • 1
  • 5
10
votes
3 answers

Physically auditing the layout of transistors inside a processor made at 22mm process die

What is necessary to check that the layout of all the 35000 transistors on a given physical processor was not tampered with, assuming the normal layout and its dispositions on the die are extensively documented? Microscope ? Specialized imaging…
user2987828
  • 201
  • 1
  • 5
10
votes
1 answer

GDB via JTAG on ARM Hardware target without source code

Does anyone have other solutions for connecting to a remote ARM target without IDA? This is the question and below I give examples of setup's i have tried, should anyone be interested. Update: updated Codeworks test for remote gdb Update: GDB setup…
cyphunk
  • 101
  • 4
10
votes
1 answer

Where could one find a collection of mid-file binary signatures?

While reading an answer to another question, it was mentioned that "78 9C" was a well-known pattern for Zlib compressed data. Intrigued, I decided to search up the signature on the file signature database to see if there were any related numbers. It…
Archenoth
  • 1,475
  • 13
  • 17
10
votes
1 answer

What does this memory pattern pointing from the thread-local storage mean?

An application I am currently looking add is using Threads and accessing something via the thread-local storage. It is compiled with Visual C++ (probably 6.0). First question would be, where can I find more information what the thread-local storage…
samuirai
  • 3,079
  • 4
  • 23
  • 37
10
votes
2 answers

Moving from Windows to Linux for Malware analysis. What should I consider?

I currently use Windows 7 as my host machine and want to move to Fedora. I have IDA Pro + hexrays decompiler, VMWare Workstation, Hiew, Visual Studio, Olly, and several other smaller tools that should run just fine in wine. I know I can get the…
10
votes
2 answers

Detecting an emulator using the windows api

I've been given a program that emulates the Windows API. I'm attempting to find flaws in this emulator where it either: Always returns a constant value, regardless of the host system (Useful for fingerprinting) For example, calls to get the…
drewb
  • 103
  • 5
10
votes
2 answers

Connecting to jtag-openocd-gdb to arm11 device with IDA gets no control

I have a binary chunk from a piece of hardware I've been deciphering with IDA for a couple days now. Today I finally got a probe connected via JTAG and have openocd start up a GDB server. IDA is connecting to the GDB service but when I attach to…
frunk420
  • 151
  • 6
10
votes
1 answer

Filling C++ interface method names in the disassembly in IDA

I have a C++ header with interfaces (classes with all methods pure virtual). I also have a binary which returns pointers to these interfaces. I debugged while running and received the virtual table addresses for these interfaces' implementation. Is…
Asaf
  • 201
  • 2
  • 3
10
votes
2 answers

What is a correct disassembler?

A disassembler is supposed to produce a human readable representation of the binary program. But the most well known techniques: linear sweep and recursive traversal (see this comment for more) are known to be easily mislead by specific tricks. Once…
perror
  • 19,083
  • 29
  • 87
  • 150
10
votes
1 answer

Is there a list of Ghidra's variable prefixes?

In Ghidra, the decompiler prepends various prefixes to variable names. For instance, iVar1 is an integer. However, there are a lot of prefixes that aren't immediately obvious, find some below, but I'm looking for a complete dictionary if anyone…
Axel Persinger
  • 201
  • 2
  • 4
10
votes
2 answers

Binary instrumentation with Python

I'm interested in performing (dynamic) binary instrumentation using Python to be able to analyze the binary by instructions during execution for Windows Linux Can someone suggest such tool/framework? Does it even exist or possible?
PhoeniX
  • 3,052
  • 16
  • 30
10
votes
2 answers

Android bytecode verifier

One of the things that makes Java bytecode (.class) so easy to reverse engineer is that the JVM's verifier ensures that bytecode can always be disassembled via linear sweep. Instructions have to be consecutive starting at offset 0, and you can't…
Antimony
  • 2,012
  • 11
  • 16