There are many basic shellcodes that can be emulated from the beginning from the end providing IOC like where is connecting and so on. But what can we do when the emulation get stuck at some point?
The console has many tools to interact with the emulator like it was a debugger but the shellcode really is not being executed so is safer than a debugger.
target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin -vv
In some shellcodes the emulator emulates millions of instructions without problem, but in this case at instruction number 176 there is a crash, the [esp + 30h] contain an unexpected 0xffffffff.
There are two ways to trace the memory, tracing all memory operations with -m or inspecting specific place with -i which allow to use registers to express the memory location:
target/release/scemu -f ~/Downloads/shellcodes_matched/drv_shellcode.bin -i 'dword ptr [esp + 0x30]'
Now we know that in position 174 the value 0xffffffff is set.
But we have more control if we set the console at first instruction with -c 1 and set a memory breakpoint on write.
This "dec" instruction changes the zero for the 0xffffffff, and the instruction 90 is what actually is changing the stack value.
Lets trace the eax register to see if its a kind of counter or what is doing.
Related posts
- Pentest Tools Open Source
- Hacking Tools Kit
- Pentest Tools Find Subdomains
- Pentest Tools Website Vulnerability
- Termux Hacking Tools 2019
- Install Pentest Tools Ubuntu
- Pentest Tools Download
- New Hacker Tools
- Hacker Security Tools
- Ethical Hacker Tools
- Pentest Tools Github
- Install Pentest Tools Ubuntu
- Best Pentesting Tools 2018
- Pentest Tools Review
- Hacker Tools Online
- Hacking Tools Hardware
- Hacker Tools Windows
- Black Hat Hacker Tools
- Hacker Tool Kit
- Best Pentesting Tools 2018
- Pentest Automation Tools
- What Are Hacking Tools
- Pentest Tools Online
- Pentest Tools Alternative
- Pentest Tools
- Hacking Tools Hardware
- Hack Tools For Pc
- Kik Hack Tools
- Pentest Tools Windows
- Hacker Security Tools
- Hacker Techniques Tools And Incident Handling
- Hack Tool Apk
- Best Hacking Tools 2020
- Kik Hack Tools
- Hacker Tools Github
- Hacking Tools Windows
- Termux Hacking Tools 2019
- Hacker Tools Free Download
- Hacking Tools And Software
- Hacker Techniques Tools And Incident Handling
- Best Hacking Tools 2020
- Pentest Tools Kali Linux
- Hacking Apps
- Hacking Tools For Beginners
- Pentest Tools Online
- Hacker Tools Apk
- Pentest Reporting Tools
- Pentest Recon Tools
- Pentest Tools Find Subdomains
- Hack Tools 2019
- Pentest Tools Port Scanner
- Pentest Tools Port Scanner
- Blackhat Hacker Tools
- Hacking Tools 2019
No comments:
Post a Comment