Most Popular

1500 questions
6
votes
1 answer

I need quick correction on this x86 opcode conundrum

I am trying to figure out how to encode the instruction MOV DS, AX, but I am confused from the opcode table as follows: Is MOV DS all one byte, or is MOV one byte, DS the second, and the AX the third? Is the table implying that the binary value of…
6
votes
2 answers

OllyDbg: Automatically extract string when breakpoint is hit

Given a breakpoint at an expression MOV EDI, EAX, how can you automatically log/write to file the referenced string whenever the breakpoint is hit?
Martin Vogel
  • 63
  • 1
  • 3
6
votes
1 answer

Turning Technologies RF receiver

At my university we're required to purchase these RF clickers with an lcd screen so professors who choose to take attendance can do so in an automated fashion, and occasionally administer simple quizzes without having to take time to grade them. The…
Cyclone
  • 161
  • 4
6
votes
0 answers

Shotcuts in immunity debugger

Recently I started using Immunity Debugger instead of Olly where I got really got used to my custom keybidings. I could not seem to find an option to configure shortcuts/keybindings in immunity debugger. Do you know how to use custom keybinds in…
Dominik Antal
  • 2,038
  • 22
  • 39
6
votes
1 answer

How to efficiently simplify obfuscated formula in QF_BV logic with Z3?

I would like to know if there are efficient ways to simplify arithmetic formula expression over bit-vectors with Microsoft Z3. But, first, I would like to explain a bit the problem. Lets start with an example: x + y == (x ^ y) + 2 * (x & y) Both x…
perror
  • 19,083
  • 29
  • 87
  • 150
6
votes
3 answers

RE Compressed backup file,router linux based so is it compresed with zlib?

so I have backup from my router its zte zxv10h201l and its linux based but I can not identify type of compression of this file. Here is couple of first "lines" of it 00000000 99 99 99 99 44 44 44 44 55 55 55 55 aa aa aa aa …
Vido
  • 515
  • 8
  • 22
6
votes
2 answers

Static Analysis - Scope Changes

I am looking for an algorithm or some tips on how to find scope changes when doing static analysis of a decompiled ASM source. I need to know the scope changes for tracking stack usage and reaching definitions for variables. If I have a program…
6
votes
1 answer

ARM debugging interesting behavior

I was just disassembling and debugging an ARM binary for fun and I noticed something unusual. Consider the following set of instructions:- 0x00008058 <+4>: mov r1, pc 0x0000805c <+8>: add r1, r1, #24 0x00008060 <+12>: mov r0, #1 I tried…
user1743
6
votes
3 answers

Does code injected into process memory always belong to a page with RWX access?

I've seen a few memory forensics tutorials, which start by looking for injected code in the "victim's" process memory. They always seem to find the injected code in pages which have RWX access (i.e. PAGE_EXECUTE_READWRITE). Does this assumption…
Benny
  • 828
  • 7
  • 18
6
votes
2 answers

What is the difference between static disassembly and dynamic disassembly?

I am told that tools like IDA Pro are static disassembly tool, and tools like OllyDbg are dynamic disassembly tool. But from the using experiences on these tools, I don't think there is any difference between the tools in disassembly…
lllllllllllll
  • 2,485
  • 2
  • 32
  • 50
6
votes
3 answers

Is it possible to convert MIPS ASM to code?

IDA can disassemble to assembly. But, reading large assembly blocks with byte shifts, etc, is tedious work. I rather would read pseudo-code. Are there any documents, tutorials or tools for this work targeting MIPS platform? What methods are you…
user3155036
  • 145
  • 1
  • 2
  • 8
6
votes
1 answer

Unsquashfs fails

I'm trying to unsquash a file I retrieved with binwalk. DECIMAL HEX DESCRIPTION ------------------------------------------------------------------------------------------------------------------- 43892 0xAB74 U-Boot boot…
Lucas Kauffman
  • 231
  • 2
  • 6
6
votes
2 answers

Break on returning to a specific module

I'm debugging an application in OllyDbg, I pause the program at a specific place. Now I am deep inside ntdll and other gui related module calls, judging from the stack. I'ld like to break as soon as the application returns to any function within a…
Dominik Antal
  • 2,038
  • 22
  • 39
6
votes
4 answers

How antiviruses name malwares

While analyzing a binary online through the virustotal service , I found out that different AVs named the binaries differently.For instance, for that same binary Norman named it Obfuscated_A, Symantec named it WS.Reputation.1 and another AV named…
viv
  • 784
  • 1
  • 4
  • 17
6
votes
2 answers

IDA Pro/IDAPython automation through IDAPython

I have been trying to use IDA Pro (with bindiff) via IDAPython to automate the analysis process of a bios.dump file while outputting the results to a .txt / .asm file. From here I want to use the bindiff functions to compare this database with…
user3119546
  • 495
  • 4
  • 14