Reverse Engineering for Beginners
CHAPTER 54. JAVA CHAPTER 54. JAVA Perhaps, JVM has some other checks related to the stack maps. OK, let’s patch it differently b ...
CHAPTER 54. JAVA CHAPTER 54. JAVA Figure 54.4:IDA We see here theifeqinstruction which does the job. Its name stands forif equal ...
CHAPTER 54. JAVA CHAPTER 54. JAVA Figure 54.5:IDA That doesn’t work (JRE 1.7): Exception in thread "main" java.lang.VerifyError: ...
CHAPTER 54. JAVA CHAPTER 54. JAVA Figure 54.6:IDA 1 needs always to be in theTOSwhen theifeqinstruction is executed, soifeqwould ...
Part V Finding important/interesting stuff in the code ...
Minimalism it is not a prominent feature of modern software. But not because the programmers are writing a lot, but because a lo ...
CHAPTER 55. IDENTIFICATION OF EXECUTABLE FILES CHAPTER 55. IDENTIFICATION OF EXECUTABLE FILES Chapter 55 Identification of execu ...
CHAPTER 55. IDENTIFICATION OF EXECUTABLE FILES CHAPTER 55. IDENTIFICATION OF EXECUTABLE FILES 55.3 Intel FORTRAN libifcoremd.dll ...
CHAPTER 55. IDENTIFICATION OF EXECUTABLE FILES CHAPTER 55. IDENTIFICATION OF EXECUTABLE FILES 000004f0 f4 10 40 00 04 06 44 6f 7 ...
CHAPTER 56. COMMUNICATION WITH THE OUTER WORLD (WIN32) CHAPTER 56. COMMUNICATION WITH THE OUTER WORLD (WIN32) Chapter 56 Communi ...
CHAPTER 56. COMMUNICATION WITH THE OUTER WORLD (WIN32) CHAPTER 56. COMMUNICATION WITH THE OUTER WORLD (WIN32) TCP/IP networking ...
CHAPTER 57. STRINGS CHAPTER 57. STRINGS Chapter 57 Strings 57.1 Text strings 57.1.1 C/C++ The normal C strings are zero-terminat ...
CHAPTER 57. STRINGS CHAPTER 57. STRINGS 57.1.3 Unicode Often, what is called Unicode is a methods for encoding strings where eac ...
CHAPTER 57. STRINGS CHAPTER 57. STRINGS UTF-16LE Many win32 functions in Windows have the suffixes-Aand-W. The first type of fun ...
CHAPTER 57. STRINGS CHAPTER 57. STRINGS What we can easily spot is that the symbols are interleaved by the diamond character (wh ...
CHAPTER 57. STRINGS CHAPTER 57. STRINGS 57.2 Error/debug messages Debugging messages are very helpful if present. In some sense, ...
CHAPTER 58. CALLS TO ASSERT() CHAPTER 58. CALLS TO ASSERT() Chapter 58 Calls to assert() Sometimes the presence of theassert()ma ...
CHAPTER 59. CONSTANTS CHAPTER 59. CONSTANTS Chapter 59 Constants Humans, including programmers, often use round numbers like 10, ...
CHAPTER 59. CONSTANTS CHAPTER 59. CONSTANTS ...or by calling a function for comparing memory blocks likememcmp()or any other equ ...
CHAPTER 59. CONSTANTS CHAPTER 59. CONSTANTS Listing 59.3: dhcpcore.dll (Windows 7 x64) .text:000007FF6480875F mov eax, [rsi] .te ...
«
28
29
30
31
32
33
34
35
36
37
»
Free download pdf