Most Popular
1500 questions
5
votes
2 answers
IDA Pro list COM methods
I have a dll file, containing some exported functions and COM methods.
Here is my dll information opened by DLL Export Viewer:
But when i open the dll file in ida pro, i see just exported functions and none of COM methods are listed.
How I can…

newmrd
- 51
- 1
- 2
5
votes
2 answers
How to get IDA Pro to understand a virtual function table?
I'm reversing an old DirectDraw game that uses DirectX 7.
I have a LPDIRECTDRAWSURFACE7 g_lpDDSBack and g_lpDDSBack->BltFast is being called but this is how it is decompiled in HexRays:
(*(int (__stdcall **)(struct IDirectDrawSurface7Vtbl *, int,…

user16729
- 51
- 2
5
votes
2 answers
Thought I found serial port - broke embedded device instead! Help?
Well another weekend has gone by and my tinkering has caused another device to (potentially) bite the dust. I've been playing around with a couple of Slingboxes, an M1 and a 500. Today was the M1. I had taken it apart (quite easily!) and poked…

justin
- 475
- 6
- 13
5
votes
3 answers
Segmentation fault while pushing onto the stack
So I have been following some tutorials on assembly and the instructor compiles the following code:
;hello3.asm attempts to make the code position independent
section .text
global _start
_start:
;clear out the registers we are going to need
xor…

Dhayalan Pro
- 157
- 1
- 5
5
votes
2 answers
Mapping Android resource IDs to resource string
I'm trying to reverse engineer an Android app. I've tried using several decompilers, and while I'm getting java source codes to varying levels of accuracy, I'm not able to convert the resource IDs to the resource strings. In the Java source, all I'm…

user1118764
- 359
- 1
- 5
- 9
5
votes
2 answers
reverse engineering methodology
I'm new to reverse engineering and I'm following the on line course provided by the opensecurity.info site.
The author provides a methodology for reverse engineering. He recommends to find a function of interest and pseudo code it.
From the wording…

Othman
- 151
- 2
5
votes
3 answers
QEMU & router firmware
I'm trying to get the router firmware (binary) running on QEMU (if that is possible). All networking is set up fine because I've tested it using the debian_wheezy_mips_standard.qcow2
sudo qemu-system-mips -M malta -kernel vmlinux-3.2.0-4-4kc-malta…

user15945
- 51
- 1
- 2
5
votes
3 answers
IDApython and IDA-decompiler commenting
Looking at the functions exposed by idaapi I see that functions like the following are exposed.
get_user_cmt
set_user_cmt
save_user_cmts
As these functions are exposed I'm hoping that I have a way to add comments onto the hex-rays decompiler using…
user1743
5
votes
1 answer
Reverse engineering Android vendor system apps
I'm trying to reverse engineer certain Samsung system apps in the Galaxy S6 firmware system image, such as KnoxAttestationAgent.apk. I'm a noob when it comes to reverse engineering, and so far my attempts have been unsuccessful. Here's what I've…

user1118764
- 359
- 1
- 5
- 9
5
votes
3 answers
xcList of x86/x64 instructions that implicitly access registers
So I am looking for a list of instructions that implicitly do stuff like reading or writing to registers. Obvious ones would be
push/pop modifies esp, pushad accesses all
but I'm sure there are more. Does someone know of a comprehensive list?
edit:…

bernd feinman
- 463
- 1
- 3
- 10
5
votes
0 answers
I'm trying to debug small mips code snippets in IDA with QEMU as debugger, but only NOP instructions show when I start the process
I followed the tutorial IDA Help: Debugging code snippets with QEMU.
It always worked with ARM code, but now I have to reverse some MIPS and only nops are displayed like this:
Should I adjust something on the memory map? As you can see, the code is…

Attila Szasz
- 51
- 2
5
votes
1 answer
How to display dump data in IDA Debugger?
Bit of a noob question, I'm working through some examples on crackmes.
In Ollydbg and x64dbg, in the stack, disassembler and registry windows, there are texts to show values of memory locations, for instance:
I would have thought IDA would have had…

JamieS
- 59
- 2
5
votes
1 answer
Question about Keeloq - A car remote control standard
I have a question about Keeloq security. I have an original car remote controller (BFT Mitto 2) and I know this chip uses HCS301 with Keeloq implementation.
I would like to clone this remote for my girlfriend because it's very expensive to buy a new…
konova
5
votes
1 answer
Obfuscated AES decryption assembly
I have recently been sifting my way through a whole load of assembly to try to identify how a program is decrypting some data. Thus far I have identified how the IV is extracted, that the IV is 16 bytes long and that the decryption method uses…

Joshua
- 109
- 7
5
votes
1 answer
In Ollydbg, how do I change the path to a source code file without recreating entire directory structure?
I am bring a .EXE, a .PDB, and a source code .C file into my computer and attempting to look at my program in Ollydbg.
I am compiling C programs on one machine (XP Vm actually) and running them in Ollydbg 2.01 in Windows 7 on another machine. I…

Markbotix
- 169
- 1
- 11