Most Popular

1500 questions
5
votes
2 answers

IDAPython for IDAFree 5.0

I want to run some python scripts on IDAFree 5.0. However, there is no pre-built IDAPython at http://code.google.com/p/idapython/downloads/list for this version. So, I was wondering if anyone can share the built version for either Windows or Linux…
user3403765
  • 81
  • 1
  • 2
5
votes
1 answer

How to start a DOS application in DOSbox in debug mode?

DOSbox compiled with --enable-debug=heavy option becomes a powerful reversing tool. Anytime I feel like checking the disassembly and memory state I just hit Alt+Pause. But, what if I want to see the very first instructions of the program ? How do I…
ScumCoder
  • 609
  • 1
  • 7
  • 12
5
votes
2 answers

How to hook the entry point of a DLL?

I have written a C API with support for static import hooking via overwriting the corresponding IAT entry of an exported function. It works nicely for older simple applications, but for more modern applications, it is less effective. This is…
CaptainObvious
  • 398
  • 3
  • 9
5
votes
1 answer

Why did the program entry point become 'sub esp, 1C'?

I compiled the following C++ code with MinGW and opened it in OllyDbg 2.01. And the program stops at the following lines: CPU Disasm Address Hex dump Command Comments 00401570 /$ 83EC 1C SUB…
user127595
  • 53
  • 3
5
votes
3 answers

How can I view FS:[0] with windbg?

It seems that Windows 8 broke Ollydbg as several ntdll functions keep throwing exception 0xC0000008 and crashing my debugger. I am now using Windbg. But, I am unable to view FS (specifically FS:[0]). How can I get a dump of FS via Windbg? I've…
Jason
  • 165
  • 1
  • 5
5
votes
2 answers

How to identify functions in a stripped binary on x86 32bit?

I am trying to generate a coarse-grained Call Graph based on some assembly code disassembled from binary on x86 32 bit platform. It is very hard to generate a precise Call Graph based on asm code, thinking of various indirect control flow transfer,…
lllllllllllll
  • 2,485
  • 2
  • 32
  • 50
5
votes
1 answer

Decompiling/disassembling lua bytecode

I've been experimenting with decompiling Lua bytecode and found useful tools like unluac, and LuaAssemblyTools. Unluac seems to do the trick with lua scripts compiled with luac giving me almost the exact source code, however when I convert lua…
Dennefyren
  • 153
  • 1
  • 4
5
votes
2 answers

Modifying Control Flow of a running program

I am working on the binary bomb labs and i just disarmed the bomb i am planning on solving it through a debugger and work start to work on my dynamic analysis skills or i.e debugging my real question is how to patch or modify assembly instructions…
user3286303
  • 107
  • 1
  • 3
  • 7
5
votes
2 answers

Need help in figuring out checksum used in this small wireless packet

Need help in figuring out the checksum used for this small data packet. Packet is 48 bits long, I already have figured out most of the bits. Least 8 bits change even if there is a single bit change in rest of the packet. So I'm guessing this must be…
chis
  • 51
  • 3
5
votes
2 answers

Automatically convert x86 assembly to C

Just started out with x86 assembly and slowly getting the hang of it. IDA produces nice graphs that make it much easier to follow all the jumps and function calls and stuff. I've looked at examples of arithmetics, control flow, loops, and function…
MxLDevs
  • 175
  • 1
  • 2
  • 7
5
votes
2 answers

Extracting files from google chrome offline installer

I'm trying to extract the files from the Google Chrome offline installer as a reverse engineering exercise So I tried extracting the data inside the installer PE. I tried pestudio which showed me two large embedded resources, however, pestudio had…
user2183
5
votes
3 answers

Unpack & repack a firmware for use as an updated version?

I am trying to modify a firmware for TD-W8961ND router because there is a vulnerability that could allow an attacker to download the configuration file of the router which exposes the router password & make him able to control the router's settings…
kifcaliph
  • 51
  • 1
  • 1
  • 4
5
votes
1 answer

Format of .chk firmware package on WGR614v7

Note: I'm aware of the technical and legal implications of reverse-enginneering binaries. I have the firmware for a Netgear WGR614v7 router, in the form of a .chk file, coming from Netgear themselves, and I wish to unpack the file. My understanding…
nanofarad
  • 188
  • 1
  • 7
5
votes
2 answers

Rebuild symbol table

I would like to load a function I have decompiled in IDA Pro. All I have is the IDA Pro function name sub_xxxx() and obviously the address. I had thought about using dlopen to load the binary but obviously I don't have a symbol to load as the…
allbabel
  • 179
  • 3
  • 13
5
votes
2 answers

how can the processor instruction set be identified solely by examining a binary image?

Constraints: I am doing reverse engineering of a binary firmware image of unknown provenance, which operates on a device that is not physically accessible to me. That is, I can't take apart the device, don't have even block diagrams for its…
Edward
  • 2,521
  • 18
  • 25