Most Popular

1500 questions
4
votes
1 answer

Reversing encryption by analysing executable

I have a program that reads data from a file, parses/organizes it, and spits it out as an encrypted XML. The application can also take an encrypted XML and spit out the original file. My objective at this point would be to access the clear-text XML…
Juicy
  • 275
  • 5
  • 9
4
votes
2 answers

What key is being using to encrypt the key transport in this Zigbee capture?

I am working with a Zigbee system and I have been trying to grab the network key as it is exchanged during pairing. I wasn't having much luck with the combination of TI Packet Sniffer, Wireshark and Killerbee - it kept on failing. This combination…
Cybergibbons
  • 1,762
  • 2
  • 17
  • 26
4
votes
1 answer

Setting name of (newly created) functions via IDAPython

Is there a way to specify the name of a function when creating it with idc.MakeFunction()? If not, what is the best practice to rename a function? I found idc.GetFunctionName(ea) but no counterpart to set a name. A google research turned up some…
langlauf.io
  • 1,560
  • 1
  • 19
  • 36
4
votes
1 answer

How do i make gnu as recognize all ARMV7 instructions?

I disassembled an android library with IDA, and want to do some extra steps at the end of one of the functions. Currently, the last instruction bytes are BD E8 F0 8F, in thumb mode, which IDA disassembles to POP.W {R4-R11,PC}. So i found a nice…
Guntram Blohm
  • 12,950
  • 2
  • 22
  • 32
4
votes
1 answer

ELF: How to make IDA show me the correct PLT (Procedure Linkage Table) content?

I would like to make IDA disassemble the .plt section of ELF files correctly, e.g. as objdump does: objdump -D -M intel asdf | grep "Disassembly of section .plt" -A80 I don't know why but IDA gives me this (Note the dw ? and dq ?): Even the IDA…
langlauf.io
  • 1,560
  • 1
  • 19
  • 36
4
votes
1 answer

Get memory locations using IDAPython

In my code, I am using idc.GetOpnd(ea,0) and idc.GetOpnd(ea,1) to get the 2 operands of an instruction. However, if its a call (or jmp) instruction, I am getting symbols like _perror and loc_8083BA9. Using IDAPython, is it possible to remove all…
Maggie
  • 195
  • 4
4
votes
3 answers

Decompile ARM native binary - IDA Pro detects file as Shared Object

I am trying to decompile a Android ARM native binary using Hex-Rays IDA Pro. IDA detects the possible formats as ELF for ARM (Shared object) Binary file If I choose ELF for ARM (Shared object), then it correctly decompiles and detect most of the…
Joyce Babu
  • 141
  • 1
  • 1
  • 5
4
votes
2 answers

How to debug a self-debugging process?

How do you swap debuggers in Windows? In my case, I have a process A which creates a copy of itself: CreateProcessA("XXX.exe", NULL, 0x0023f560, 0x0023f560, TRUE, **DEBUG_ONLY_THIS_PROCESS**, NULL, NULL, 0x0023f5f8,…
faberle
4
votes
1 answer

Which virtualized target is recommended for newbie on vm-obfuscation?

I'm newbie on virtualized code obfuscation. I can break many features to avoid debugging/reversing and packer/protector (even Themida, without vm option), but I'm not good at virtualized code. Though I made own code virtualizing obfuscation tool,…
Pizzzzza
  • 41
  • 2
4
votes
1 answer

How to disassemble/run mips ELF file ? (with readelf error)

So i want to disassemble and then run a MIPS elf file for the first time. As i don't have MIPS hardware i am using mipsel-unknown-linux-gnu toolchain.Here comes the problem. The output of the command file myelf is: ELF 32-bit LSB executable, MIPS,…
creuchmeuch
  • 485
  • 1
  • 5
  • 9
4
votes
2 answers

When to use Windbg and Ollydbg?

According to what I know :WinDbg uses debugging information (pdb/symbol files) for debugging.So ,for example say I get a unknown exe (malicious) can I debug it since I'll not be having its .pdb. Is WinDbg best suited to analyze memory dumps and…
rebel87
  • 391
  • 1
  • 3
  • 11
4
votes
1 answer

Extracting a private key from memory

I'm trying to extract a private key used to encrypt communications in a game modification (SA-MP, closed source, runs on Windows), which uses RakNet for it's communications and presumably encryption. Language I'm using is Python, and I would like to…
Joona
  • 51
  • 1
  • 3
4
votes
2 answers

IDA basic block type fcb_cndret - what does it mean?

IDA Pro's idaapi.BasicBlock objects returned by idaapi.FlowChart() can be of the following types (see gdl.hpp in the SDK sources): // flow chart block types enum fc_block_type_t { fcb_normal, // normal block fcb_indjump, // block ends with…
langlauf.io
  • 1,560
  • 1
  • 19
  • 36
4
votes
2 answers

Reverse engineering UEFI CAP files

I'm looking to identify code changes in the latest UEFI release for my motherboard, to verify whether the changes include mitigations for the row hammer vulnerability. I'm specifically looking at the last 3 releases (2401, 2304, 2201) of the Asus…
Polynomial
  • 1,272
  • 2
  • 12
  • 21
4
votes
2 answers

Decrypt iOS standard encryption without device

In order to remove the encryption from an iOS binary on the App Store, it first has to be executed on a ARM capable device. Is there a way to do this without access to a device?
Nederealm
  • 277
  • 3
  • 12