Sigsrch 0.1.7a
by uigi Auriemma
e-mil: aluigi@autistici.org
web aluigi.org
otimized search function by Andrew http://www.team5150.com/~andrew/
dsassembler engine by Oleh Yuschuk
Usae: signsrch [options] [file1] ... [fileN]
Optons:
-l list the available signatures in the database
-L UM show the data of the signature NUM
-s ILE use the signature file FILE (signsrch.sig)
-p list the running processes and their modules
-P ID use the process/module identified by its pid or part of name/path
-d ILE dump the process memory (like -P) in FILE
-e consider the input file as an executable (PE/ELF), can be useful
because will show the rva addresses instead of the file offsets
-F as above but returns the address of the first instruction that points
to the found signature, for example where is used the AES Td0 table,
something like an automatic "Find references" of Ollydbg
-E disable the automatic executable parsing used with -P
-b disable the scanning of the big endian versions of the signatures
-3 FF execute the file applying an INT3 (0xcc) byte at the specified
offset (rva memory address, not file offset!) in hexadecimal notation
and remember to have a debugger set as "Just-in-time" debugger
use- for stdin
URLfor the updated signsrch.sig:
http://aluigi.org/mytoolz/signsrch.sig.zip
Sigsrch 0.1.7a
uigi奥列马
E-MIL:aluigi@autistici.org
网络aluigi.org
otimized搜索由安德鲁·http://www.team5150.com/功能〜安德鲁/
dsassembler引擎奥莱Yuschuk
USAE:signsrch [选项] [file1中] ... [fileN]
Optons:
-l列出可用的特征码数据库中的
-L UM显示签名NUM数据
-S ILE使用的签名文件文件(signsrch.sig)
-p列出正在运行的进程及其模块
-P ID在使用过程中确定的PID或部分的名称/路径/模块
-D ILE进程的内存转储(如P)FILE
-E考虑输入文件的可执行文件(PE / ELF),可能是有用的
因为显示的RVA地址,而不是文件偏移
-F上面一样,但返回点的地址的第一个指令
找到的签名,例如,当使用的AES TD0表
像一个自动的“查找引用”的Ollydbg
-E禁止使用-P的自动可执行文件解析
-b禁用签名的扫描的大端版本的
-3 FF申请INT3(0XCC)的字节在指定的执行文件
在十六进制记数法表示偏移(RVA的内存地址,而不是文件偏移!)
记得有一个调试器设置为“时间”调试
使用标准输入
URLfor更新signsrch.sig:http://aluigi.org/mytoolz/signsrch.sig.zip