There are many basic shellcodes that can be emulated from the beginning from the end providing IOC like where is connecting and so on. But what can we do when the emulation get stuck at some point?
The console has many tools to interact with the emulator like it was a debugger but the shellcode really is not being executed so is safer than a debugger.
target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin -vv
In some shellcodes the emulator emulates millions of instructions without problem, but in this case at instruction number 176 there is a crash, the [esp + 30h] contain an unexpected 0xffffffff.
There are two ways to trace the memory, tracing all memory operations with -m or inspecting specific place with -i which allow to use registers to express the memory location:
target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin -i 'dword ptr [esp + 0x30]'
Now we know that in position 174 the value 0xffffffff is set.
But we have more control if we set the console at first instruction with -c 1 and set a memory breakpoint on write.
This "dec" instruction changes the zero for the 0xffffffff, and the instruction 90 is what actually is changing the stack value.
Lets trace the eax register to see if its a kind of counter or what is doing.
- Hacker Tools For Mac
- Hacker Tools Hardware
- Hacker Tools Mac
- Kik Hack Tools
- Pentest Box Tools Download
- Pentest Tools Bluekeep
- Hacking Tools Mac
- Pentest Reporting Tools
- Hack Tools Online
- Hack Tools
- Pentest Tools For Windows
- Physical Pentest Tools
- What Is Hacking Tools
- Hack Tools Mac
- Ethical Hacker Tools
- Android Hack Tools Github
- Hacking Tools Free Download
- Nsa Hacker Tools
- Hack Tools Online
- Beginner Hacker Tools
- Tools For Hacker
- Hacker Tools 2020
- Pentest Tools Github
- Hacking App
- Hack Tools
- Pentest Tools Subdomain
- Hacking Tools
- Hack Tools 2019
- Computer Hacker
- Hack Tools Github
- Hacker Security Tools
- Tools 4 Hack
- Hacker Tools Github
- Hack App
- Hacker Tools For Pc
- Hacking Tools For Mac
- Free Pentest Tools For Windows
- Hacker Hardware Tools
- Hacking Tools Github
- Hacker Tools Mac
- Tools For Hacker
- Hacking Tools Usb
- Hacking Tools For Mac
- Pentest Tools For Android
- Game Hacking
- Hack Tools For Games
- Hack Tools 2019
- Pentest Tools Website Vulnerability
- Hacking Tools For Windows
- Pentest Recon Tools
- Pentest Tools Url Fuzzer
- Android Hack Tools Github
- Hack Tools Pc
- Pentest Automation Tools
- Hacking Tools For Windows
- Pentest Reporting Tools
- Hacker Tools Apk
- Hacking Apps
- Hacking Tools Usb
- Best Pentesting Tools 2018
- Pentest Tools Subdomain
No comments:
Post a Comment