首页
社区
课程
招聘
[转帖]IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature
发表于: 2021-1-14 06:38 2425

[转帖]IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature

2021-1-14 06:38
2425

IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature

In this video, we are going to see that we can get decrypted code very fast in our IDB without bothering to write IDA Python scripts. In those examples, I am using simple XOR, but it is very simple to change the algorithm to something more complex and custom. I don't want to spend time coding a script when I can just use a very nice feature presented in this IDA Pro Debugger Tutorial.


Here are the 3 examples for today:


- A simple encrypted PE file with a few visible layers


- An encrypted PE file with 60 layers which are hidden

(I will show you how you can use the trace feature to find the start

 of decrypted code without any effort as well in this example)


- One PE file decrypting and executing routine onto allocated memory


In those 3 examples, we will see how the memory snapshot feature can save you a lot of time

https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.reverse-engineer.net%2Fhexorcism&event=video_description&redir_token=QUFFLUhqbDFvb0hTcUd2c2V1SUJoYnkzNFpnZWJQUGx6QXxBQ3Jtc0ttRFBabG93cVRISlRqeVhHbzBMOGJuUlhoRmFVUjBFSUR4dF85eG8xOFd5azNWeXFSWnJDQVUyaGE5Z1BGdVhLMlhFaDZKcFZDdVZsQkNsaGN6MHRtWXBHZ3ZOcXBHMFlwbkxIdkRTVHlqaTRybFFRUQ%3D%3D&v=plaRysF1cxk

https://www.youtube.com/watch?v=plaRysF1cxk



[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

收藏
免费 2
支持
分享
最新回复 (3)
雪    币: 351
活跃值: (194)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
2
一直用梯子看youtube,只能全代理,不能自动代理切换,今天才明白,视频地址Host是:
Host:r5---sn-npoeened.googlevideo.com
终于可以愉快的使用Auto Switch了。
2021-1-14 09:29
0
雪    币: 822
活跃值: (526)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
3
谢谢分享 
2021-1-15 18:17
0
雪    币: 2466
活跃值: (4561)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
4
总结一下就是:通过trace找到什么时候自解密代码运行完成,然后设置硬断让程序解密完成之后停下来,然后使用debugger-->take mem snap拍摄内存快照
2021-1-16 11:59
0
游客
登录 | 注册 方可回帖
返回
//