There are many basic shellcodes that can be emulated from the beginning from the end providing IOC like where is connecting and so on. But what can we do when the emulation get stuck at some point?
The console has many tools to interact with the emulator like it was a debugger but the shellcode really is not being executed so is safer than a debugger.
target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin -vv
In some shellcodes the emulator emulates millions of instructions without problem, but in this case at instruction number 176 there is a crash, the [esp + 30h] contain an unexpected 0xffffffff.
There are two ways to trace the memory, tracing all memory operations with -m or inspecting specific place with -i which allow to use registers to express the memory location:
target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin -i 'dword ptr [esp + 0x30]'
Now we know that in position 174 the value 0xffffffff is set.
But we have more control if we set the console at first instruction with -c 1 and set a memory breakpoint on write.
This "dec" instruction changes the zero for the 0xffffffff, and the instruction 90 is what actually is changing the stack value.
Lets trace the eax register to see if its a kind of counter or what is doing.
Continue reading
- Top Pentest Tools
- Install Pentest Tools Ubuntu
- Hacking Tools Windows 10
- Hacker Tools Free
- Hacking Tools Name
- Hacker Tools 2019
- Hacker Tools
- Hacker Tools Linux
- Game Hacking
- Hacking Tools For Kali Linux
- Wifi Hacker Tools For Windows
- Pentest Tools For Mac
- Pentest Recon Tools
- Github Hacking Tools
- Hack Tools Online
- Hack Tools
- Hacker Tools Github
- Bluetooth Hacking Tools Kali
- Growth Hacker Tools
- Hacker Tools For Mac
- Github Hacking Tools
- Pentest Tools Framework
- Pentest Tools For Windows
- Hacking Tools Name
- Hacking Tools Mac
- New Hacker Tools
- Hacking Tools For Pc
- Hacker Tools For Ios
- Hacking Tools And Software
- Tools Used For Hacking
- Hacking Tools Github
- Hacker Search Tools
- Pentest Tools Free
- Hack Tool Apk No Root
- Pentest Tools Alternative
- Hacking Tools Windows 10
- Hacker Tools
- Bluetooth Hacking Tools Kali
- Blackhat Hacker Tools
- Nsa Hack Tools Download
- Hacking Tools Hardware
- Github Hacking Tools
- Pentest Tools For Mac
- How To Hack
- Pentest Tools List
- Hack Tool Apk No Root
- Pentest Tools Find Subdomains
- Pentest Tools Find Subdomains
- Hacking Tools Windows 10
- Hacker Tools
- Best Pentesting Tools 2018
- Hack Tools Download
- Hacker Tools Online
- Hacking Tools Software
- Hack Tools For Ubuntu
- Pentest Tools Find Subdomains
- How To Make Hacking Tools
- Hacker Tools Apk Download
- Pentest Tools Find Subdomains
- Pentest Tools Tcp Port Scanner
- Hacker Tools Apk
- Pentest Tools Bluekeep
- Pentest Tools Review
- Pentest Tools For Ubuntu
- Pentest Tools Bluekeep
- Wifi Hacker Tools For Windows
- Hacking Tools 2019
- Hacker Tools For Windows
No comments:
Post a Comment