Most Popular

1500 questions
7
votes
2 answers

Any way to fix misinterpreted case jump tables in Ida Pro?

I'm disassembling a function that seems to use a switch statement, resulting in an indexed indirect jump, in two different places (same function!): 0005FA58 mov al, [eax+112h] 0005FA5E cmp al, 4 0005FA60 …
Guntram Blohm
  • 12,950
  • 2
  • 22
  • 32
7
votes
4 answers

System for reverse engineering RF signals

Lately I've been experimenting with software-defined radio (SDR) and have come up with some heuristics by which I can visually identify certain kinds of signals by looking at their representation on a waterfall diagram. Certain obvious…
Edward
  • 2,521
  • 18
  • 25
7
votes
3 answers

No dynamic symbol table but resolution of method from shared libraries is working

I want to find how can I identify calls to shared libraries in GDB only. On a stripped binary, I cannot found the dynamic symbol table: $> objdump -tT crackme-01 crackme-01: file format elf32-i386 objdump: crackme-01: not a dynamic…
Kartoch
  • 173
  • 1
  • 5
7
votes
2 answers

\??\C:\ Question Marks in Paths

I often come across paths similar to \??\C:\Windows when looking in memory. I have been unable to understand why the double '?' is appended to some paths. My google-fu is failing me with the ability to find a reason for the double '?'.Any…
user4089
  • 73
  • 1
  • 4
7
votes
1 answer

understanding the stack

I have de-assembled a x86 application use ida, it generates the following code .text:1084FF10 push ebp .text:1084FF11 mov ebp, esp .text:1084FF13 and esp, 0FFFFFFF8h .text:1084FF16 …
upton
  • 226
  • 1
  • 9
7
votes
1 answer

How to get IDA Pro Free to automatically change segment on retf?

I have been unable to get IDA pro to do a simple disassembly of a flat 16-bit binary (bootloader) file. I'm just getting started, and it seems to be harder than it should be. There's a simple set of instructions, that do seg000:7C5D …
Milind R
  • 203
  • 1
  • 8
7
votes
2 answers

Retrieving encryption/encoding logic from dll

I am trying to retrieve a decrypting/deconing logic from a program. Unfortunately I have virtually no experiencing in reverse engineering. I am building an alternative controller application for a multimedia device. The original controller is…
leepfrog
  • 171
  • 1
  • 3
7
votes
2 answers

Extracting dynamically constructed strings in IDA

Sometimes strings are dynamically constructed in programs due to compiler optimization or simply to hide the strings (e.g. in malware). For example : When displaying the bytes as chars we can see the string 'INVALID FILE SIZE'. Does anyone know a…
ekse
  • 2,208
  • 13
  • 19
7
votes
4 answers

Is there any tool to quantitatively evaluate the difference of binary?

I know some binary diff tool like VBinDiff and others. Currently I have a large number of binary, around 500. So I am looking for a binary tool to quantitatively evaluate the difference of binaries.. Like evaluate the difference of binary 10 and…
lllllllllllll
  • 2,485
  • 2
  • 32
  • 50
7
votes
2 answers

Can a Windows process check if it has been injected by another process?

There are many tutorials which show how to detect injected code into process memory. However, this generally requires using a debugger. Is it possible for a process to somehow detect if it has been injected by another process using winapi? If so,…
Benny
  • 828
  • 7
  • 18
7
votes
2 answers

How much Cryptography knowledge is important for reverse engineering?

Is understanding of Cryptography really important for a reverse engineer? Thanks.
Pranit Kothari
  • 927
  • 1
  • 10
  • 13
7
votes
1 answer

Why IDA Pro generated a "j_printf" function call?

Test platform is windows 32 bit. IDA pro 64 So, basically I use IDA pro to disassemble a PE file, and do some transformation work on the asm code I get, to make it re-assemblable. In the transformed code I generated, the system function call like…
lllllllllllll
  • 2,485
  • 2
  • 32
  • 50
7
votes
2 answers

Decompiling Modem Firmware (firmware.bin) with unknown results on binwalk

I'm just new to these field. So bare with me. These is the result when I run binwalk. When I try to extract it using binwalk, it just give endless archives and files to analyse. Any ideas if it is a false positive? I just want to access one web…
Thomson Bobby
  • 71
  • 1
  • 1
  • 2
7
votes
1 answer

Can I evaluate operand values of an instruction currently at breakpoint (while debugging) in IDA using IDAPython?

Let's say I have lots of breakpoints at some push instructions. I am trying to dereference the operand (if address) - get the actual relevant value for each one in a script, handling immediate, base + index, register, etc. Can I do this in any other…
algotroll
  • 71
  • 1
7
votes
1 answer

Modules that exist in a process address space

Using volatility to inspect a services.exe process in a memory dump, I built a list of dll's that are loaded in the process space. (The modules are from the InLoadOrder module list) This is just an excerpt (full list:…
user3365
  • 197
  • 7