There are many basic shellcodes that can be emulated from the beginning from the end providing IOC like where is connecting and so on. But what can we do when the emulation get stuck at some point?
The console has many tools to interact with the emulator like it was a debugger but the shellcode really is not being executed so is safer than a debugger.
target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin -vv
In some shellcodes the emulator emulates millions of instructions without problem, but in this case at instruction number 176 there is a crash, the [esp + 30h] contain an unexpected 0xffffffff.
There are two ways to trace the memory, tracing all memory operations with -m or inspecting specific place with -i which allow to use registers to express the memory location:
target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin -i 'dword ptr [esp + 0x30]'
Now we know that in position 174 the value 0xffffffff is set.
But we have more control if we set the console at first instruction with -c 1 and set a memory breakpoint on write.
This "dec" instruction changes the zero for the 0xffffffff, and the instruction 90 is what actually is changing the stack value.
Lets trace the eax register to see if its a kind of counter or what is doing.
Related links
- Hacking Tools Download
- New Hacker Tools
- Free Pentest Tools For Windows
- Pentest Tools List
- Tools 4 Hack
- Hack Tools Download
- Tools For Hacker
- Hacker Hardware Tools
- Hacking Tools Download
- Pentest Recon Tools
- Android Hack Tools Github
- Hack Tools Pc
- Pentest Tools Url Fuzzer
- Pentest Tools Subdomain
- Hacker Hardware Tools
- Pentest Tools For Windows
- Wifi Hacker Tools For Windows
- Hacking Tools Usb
- What Are Hacking Tools
- Android Hack Tools Github
- New Hack Tools
- Hack Tools Github
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Software
- Hacking Tools For Windows Free Download
- Pentest Tools Nmap
- Pentest Recon Tools
- Pentest Tools Linux
- Hacker Search Tools
- Hacker
- Pentest Tools Android
- How To Hack
- Pentest Tools Framework
- Pentest Reporting Tools
- Hacker Tool Kit
- Hacking Tools
- Hacking Tools For Pc
- Hacking Tools Download
- Pentest Tools Alternative
- Ethical Hacker Tools
- Nsa Hack Tools Download
- Pentest Tools Website
- Pentest Box Tools Download
- Hackers Toolbox
- Hacking Tools For Pc
- Hacker Tools For Ios
- Github Hacking Tools
- Pentest Tools List
- Hacker Tools
- Hacker Tools 2019
- Hacking Tools Kit
- Top Pentest Tools
- Hackers Toolbox
- Hack Tools Github
- Pentest Tools
- Hacker Hardware Tools
- Hacker Tools Mac
- Hacker Tools 2020
- Pentest Tools Github
- Game Hacking
Nenhum comentário:
Postar um comentário