Answer
stringlengths
38
29k
Id
stringlengths
1
5
CreationDate
stringlengths
23
23
Body
stringlengths
55
28.6k
Title
stringlengths
15
145
Tags
stringlengths
3
68
<p>Here's how you can automate the labelling process:</p> <pre class="lang-py prettyprint-override"><code>import idc, idautils FUNC_LIB = 4 # Here go your selected functions # This labels everything unless you specify the start/end args funcs = idautils.Functions() for ea in funcs: flags = idc.get_func_flags(ea)...
32073
2023-07-19T05:09:09.683
<p>I have a binary with debug information and I want to mark STL library functions with &quot;Library function&quot; tag as quick as possible, just by highlighting a range of functions and clicking some button instead of marking every function &quot;Library function&quot; by hand. <a href="https://i.stack.imgur.com/AGx...
How to quickly mark functions library in IDA Pro?
|ida|idapython|python|script|
<p>You've stumbled into a complicated question. I'll try to answer it in detail, but for starters, the fact that there are two locations shown for a single stack variable does not mean that it is at two different locations. It means that Hex-Rays is using two different ways of referring to the same location on the the ...
32074
2023-07-19T06:36:02.297
<p>Suppose I have a function, I know that the first 4 arguments come with fixed registers.</p> <pre><code>_BYTE *__fastcall foo(__int64 a1, _QWORD *a2, unsigned int a3, char a4, _QWORD *a5) </code></pre> <p>For the fifth one, if I move my mouse on that argument, it displays a hint</p> <pre><code>_QWORD *a5 // [rsp+120h...
split function argument from IDA's hints
|ida|functions|
<p>You can't control where the compiler will put a local variable on the stack. It could put it anywhere on the stack, or even eliminate it entirely (for example, hold it in a register). There's a reason that mitigations like these are implemented inside of the compiler itself and not as source-level transformations.</...
32078
2023-07-19T17:46:12.330
<p>Can i insert a variable in c source code That will be right before the stack canary, and after all local variables. Like I want to try to implement my own stack canary in source code, is it possible?</p> <p>Thanks</p> <p><strong>Update</strong></p> <p>Can you please explain to me what is this code in <a href="https:...
Can I insert a variable right before the stack canary
|stack-protector|
<p>why using switch s ? switch s takes a size parameter and you do not give it ?</p> <p>you are looking for a symbol from ndis on a module named tcpip ?</p> <p>what is the L?0xffffxxxx doing there ?</p> <p>are you sure symbol name takes the form of string with enclosed double quotes ?</p> <p><a href="https://learn.micr...
32085
2023-07-22T13:27:39.517
<p>I want to use the x command to search for functions that take _NET_BUFFER_LIST as an argument(maybe they will take more than one argument). Its symbol is ndis!_NET_BUFFER_LIST. The command I use</p> <pre><code>0:000&gt; x /s module!module+0x1000 L?0xffffffff &quot;ndis!_NET_BUFFER_LIST&quot; Couldn't resolve error a...
windbg command to search all functions that take in certain arguments
|windbg|
<p>In x64dbg, You can right-click the beginning of the function or any place in the instructions/disassembly that you want the execution to continue from for that matter, and simply press on &quot;Set New Origin Here&quot; or Ctrl+*.</p>
32103
2023-07-28T14:20:16.427
<p>I'm currently debugging a program using x64dbg, and I'm wondering how to quickly jump to the start or end (prologue/epilogue) of a function while I'm in the middle of it. I couldn't find this information through Googling.</p> <p>Specifically, I'd like to know if x64dbg has any built-in commands or shortcuts to navig...
How can I jump to the start/end of a function in x64dbg?
|debugging|x64dbg|functions|
<p>As suggested in a comment, the final character is indeed a check digit. It appears to be calculated using the <a href="https://en.wikipedia.org/wiki/Luhn_algorithm" rel="nofollow noreferrer">Luhn algorithm</a> with 25 as the base instead of 10.</p> <p>Using the code in photo as an example:</p> <ol> <li>The code with...
32129
2023-08-04T14:38:09.683
<p>Receipts from McDonald's in the UK include a code that allows you to complete an online survey as shown in the attached image (in the green box):</p> <p><a href="https://i.stack.imgur.com/pBh00.jpg" rel="noreferrer"><img src="https://i.stack.imgur.com/pBh00.jpg" alt="McDonald's receipt" /></a></p> <p>After gathering...
McDonald's receipt codes
|decryption|encryption|
<p>The code that runs before your <code>main</code> function is the C Runtime (CRT) initialization code. There are ways to remove it, such as via the <code>/NODEFAULTLIB</code> and <code>/ENTRY</code> command-line options to the linker, but be careful what you wish for. If any of your code calls functions in the C stan...
32131
2023-08-04T16:11:23.003
<p>I am using x64dbg to explore image files on Windows. After the computer finishes prowling ntdll.dll it jumps to OptionalHeader.AddressOfEntryPoint. But this is not my main()-function.</p> <ol> <li>What is this code in my EXE that is not mine?</li> <li>Can you remove it so there is only my main()-function remaining?<...
Create exe that jumps directly into main()-function from C
|c|pe|x64dbg|
<p>Looks like some form of <a href="https://en.wikipedia.org/wiki/Run-length_encoding" rel="nofollow noreferrer">run length encoding</a> could be custom since it's quite simple to write. You can lookup run length encoding in TGA image files for a code example. But personally I would first check if it's LZ4 since that u...
32134
2023-08-05T20:25:07.283
<p>I'm trying extract .wav files from a datafile, and each file has some metadata at the end of it. It contains a date, '1996-05-16' as shown here:</p> <p><a href="https://i.stack.imgur.com/qQCAX.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/qQCAX.png" alt="enter image description here" /></a></p> ...
I don't understand this hexeditor output
|hex|
<p>In every line the sum of all big-endian words modulo <code>0xFFFF</code> equals to 0.<br /> Example (the last line):</p> <pre><code>0x4547 + 0x4953 + 0x0000 + ... + 0x9341 + 0xc0b4 + 0x3b00 = 0x9FFF6 </code></pre> <p>To verify the checksum:</p> <ul> <li>append zero byte if number of bytes is odd;</li> <li>calculate ...
32157
2023-08-11T15:12:23.453
<p>I have been working on reverse engineering and building a Linux driver for a fingerprint reader and have most of it sorted out, but one thing which continues to elude me is that there seems to be 2 bytes in each payload that are some kind of &quot;check bytes.&quot; I am not sure if one or both are some kind of CRC,...
Derive logic for 2 "check bytes" for a USB fingerprint reader
|crc|checksum|
<p>Frida seems to have some bugs regarding Java arrays that are modified or replaced by JavaScript code. My guess is that the conversion (and mapping of modifications) between the Java array instance and JavaScript array instance has some flaws.</p> <p>Therefore the only alternative I see is using pure Java methods to ...
32161
2023-08-11T18:55:09.570
<p>Let's assume we have a such code snippet:</p> <pre><code>public class Test { public void testArrayValue() { Object[] objects = new Object[1]; fillObject(objects); Log.d(&quot;test&quot;, (String)objects[0]); } public void fillObject(Object[] objects) { objects[0] = new String(&quot;fillObject s...
Frida Android how to change value of array passed to method
|java|frida|
<p>I just followed the guide from blabb. In my IDA, it's Edit-&gt;Segments-&gt;Rebase program. The image base is 0x1C0000000 instead of 1C0001000. The PE has some other headers before the section headers(.text,.data etc) to provide other essential information for the OS to manage files.</p> <p>The command Ali gave me w...
32164
2023-08-12T08:39:41.197
<p>In IDA, I see a value called dword_1C0203AB4 which doesn't have a symbol name. I want to view the value in system. My windbg is connected to the system and the driver files in system and IDA is the same. My approach is to calculate the offset and add it to the base memory.</p> <pre><code>start .text:00000001C0001000...
how to access the initialized data in windbg through offset from IDA
|ida|windbg|
<p>This is not a ghidra answer but done using windbg Assuming You Have Code as below</p> <pre><code>#include &lt;windows.h&gt; #include &lt;stdio.h&gt; #pragma comment(lib, &quot;Advapi32.lib&quot;) void hexdump(byte *inbuf, DWORD count) { DWORD j = 0; while (j &lt; count) { for (DWORD i = j; i &lt;...
32166
2023-08-12T10:24:57.820
<p>I am trying to analyze the <a href="https://learn.microsoft.com/en-us/windows/win32/api/wincrypt/nf-wincrypt-cryptgenrandom" rel="nofollow noreferrer">CryptGenRandom</a> algorithm on my Windows 10 laptop.</p> <p>According to Niels Ferguson's <a href="https://aka.ms/win10rng" rel="nofollow noreferrer">Whitepaper</a> ...
How can I find the buffer of CryptGenRandom?
|ida|disassembly|windows|binary-analysis|ghidra|
<p>When a ELF binary is loaded each one of its sections is loaded to a Virtual Memory Address which is different than its raw offset on disk.</p> <p>Now, objdump shows the contents of the __got's as if it was mapped to it's virtual memory address in 0x3fc0.</p> <p>However, xxd would show the contents of the same addres...
32174
2023-08-14T20:57:33.460
<p>I seriously can't tell if I'm misunderstanding something grossly or if this is a bug in objdump. Newbie alert.</p> <pre><code>$ objdump -s --start-address=0x3fc0 --stop-address=0x3fc1 test test: file format elf64-x86-64 Contents of section .got: 3fc0 00 . $ xx...
ELF - Why does objdump provide a wrong byte value in the .got?
|decompilation|c|elf|x86-64|objdump|
<p>I don't know of any tools that can analyze or disassemble CIL bytecode, but what you can do is to <strong>link</strong> those files and produce normal machine code. E.g. something like:</p> <pre><code>LINK 1.obj /force /debug /dll /out:1.dll /noentry </code></pre>
32181
2023-08-16T14:43:35.117
<p><a href="https://learn.microsoft.com/en-us/archive/msdn-magazine/2002/may/under-the-hood-link-time-code-generation" rel="nofollow noreferrer">This</a> Microsoft article states that:</p> <blockquote> <p>When building with LTCG, the compiler front end doesn't invoke the back end. Instead, it emits an OBJ file with IL ...
Tool to analyze .obj files (not COFF) created with /LTCG
|ida|windows|compiler-optimization|object-code|linker|
<p>The buffer is printed from CurrentMdl-&gt;MappedSystemVa+CurrentMdlOffset upto Size-CurrentOffset</p> <p>When there is an MDLChain the data is printed for all Next-&gt;MappedSystemVa</p> <p>And when posting output from windbg do not edit and insert your own address in the first dump the address starts from 0 but it ...
32196
2023-08-21T18:35:41.820
<p>I'm trying to figure out how the below windbg extension works</p> <pre><code>!ndiskd.nbl addr -hexcap(or -data) </code></pre> <pre><code>kd&gt; !ndiskd.nbl ffffce8c96bde070 -hexcap # NET_BUFFER_LIST ffffce8c96bde070 # NET_BUFFER ffffce8c96bde1f0 # MDL ffffce8c96bde2c8 00000000 30 39 20 b1 97 42 11 ...
unable to figure out how a windbg extension work
|windows|windbg|
<p>well if you really need to trace each execution just looking for a value in some register and willing to spend the time you can run a script recursively on each instruction</p> <p>it is very time consuming and is equivalent to setting the trap flag on each instruction</p> <p>here is how you do it using the same exam...
32200
2023-08-23T17:31:41.427
<p>I'm using windbg to find the memory of a specific structure in windows. The way is to look at certain values stored in stack and registers in entry function. I notice that register ax holds that value when the program executes one instruction(So I have the address of that instruction). I assume that the value of ax ...
how to stop windbg when register value changes
|windows|windbg|
<p>Turns out that Cutter actually provides RTTI information, but not under the &quot;Symbols&quot; window but under another &quot;Classes&quot; window that is hidden by default.</p> <p>You can open it from <em>Windows &gt; Info &gt; Classes</em>.</p>
32201
2023-08-24T08:09:29.683
<p>I am reversing a 32 bit library used by a Linux game (I am sure someone might recognize the engine used). I was messing around with <a href="https://github.com/rizinorg/cutter" rel="nofollow noreferrer">cutter</a> and when trying to compare it to IDA, which I have used in the past for this library, I noticed that I ...
How does IDA know the symbol names for classes and interfaces?
|ida|c++|symbols|vtables|cutter|
<p>In the short term, you'll likely need to understand and debug both x86 and ARM assembly, even if you don't write in them. Here's why:</p> <ul> <li>Analyzing malware demands the skill to read and track its behavior.</li> <li>A significant portion of malware targets Windows and Linux on x86 systems, which underscores ...
32207
2023-08-24T15:52:56.333
<p>I know we have some architectures for assembly language. But I wanna know this: I need learn x86 assembly ? , or arm assembly ? , or both ? , or others ?..</p> <p>Please help me , what should I learn?</p>
Assembly for malware analysis
|assembly|
<p>This answer is based on <a href="https://codegolf.stackexchange.com/questions/177803/parse-the-bookworm-dictionary-format">this post on codegolf</a></p> <p>It mentions</p> <p>The rules for unpacking the dictionary are simple:</p> <ol> <li><p>Read the number at the start of the line, and copy that many characters fro...
32224
2023-08-27T12:05:33.690
<p>I am looking at the &quot;wordlist.txt&quot; file for Bookworm Deluxe (an old game by PopCap), and I have not been able to make sense of it. Most of the lines seem to be pieces of words, often with a single digit prefixing them. These numbers do not constantly represent a same letter combination, as 2rdvark would se...
Bookworm Deluxe wordlist not understood. Any insights?
|game|
<p>You could make use of <a href="https://hex-rays.com/products/ida/tech/flirt/" rel="nofollow noreferrer">FLIRT</a> signatures.</p> <p>There's a <a href="https://github.com/NWMonster/ApplySig" rel="nofollow noreferrer">Python script</a> porting IDA FLIRT for Ghidra. You can use existing signature sets, for instance <a...
32226
2023-08-27T22:25:55.767
<p>I am attempting to reverse-engineer an old DOS executable, which seems to have been compiled around 1992 using Microsoft's C compiler at the time.</p> <p>When opening the executable in Ghidra no imports are listed, so I assume that any library functions that were utilised have been statically linked. Certain strings...
Identifying C/C++ Library Functions
|c++|ghidra|c|dos|dos-exe|
<pre><code> 14098c632 48 89 44 24 28 MOV qword ptr [RSP + local_40],RAX=&gt;KiSchedulerApc </code></pre> <p>for a line like above you want the operand Representation?</p> <p>you mean something like this</p> <pre><code>&gt;&gt;&gt; currentLocation OperandFieldLocation@14098c632, refAddr=1402fa5b0, row=...
32229
2023-08-28T15:00:36.880
<p>I tried several hours to find a way to get the operand address which is displayed in the ghidra listing, but without success:</p> <p><a href="https://i.stack.imgur.com/LKSuu.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/LKSuu.png" alt="indirect operand address" /></a></p> <p>I know at least that...
Ghidra scripting: get indirect operand address
|ghidra|script|
<pre><code>import ida_funcs import ida_auto funcEa = 0x08054FE1 newEndEa = 0x08054FF7 f = ida_funcs.get_func(funcEa) f.end_ea = newEndEa ida_funcs.update_func(f) ida_funcs.reanalyze_function(f) ida_auto.auto_wait() </code></pre> <p>In response to your edit, perhaps some basic safety precautions would help, as in:</p>...
32241
2023-08-31T00:10:12.817
<p>I’m trying to set a function chunk end at a certain EA in a function using my Ida python plugin, but I can’t find any API which lets me do just that. set_func_end appear not to work (keeps returning false.). Basically I’m trying to simulate the action of pressing “E” at a certain EA. Appreciate any help, thanks in a...
IDA python API set function chunk end
|ida|idapython|
<p>I found this IR protocol documented in <a href="https://github.com/crankyoldgit/IRremoteESP8266#readme" rel="nofollow noreferrer">IRremoteESP8266</a> in the source code files <a href="https://github.com/crankyoldgit/IRremoteESP8266/blob/master/src/ir_Midea.h" rel="nofollow noreferrer">ir_Midea.h</a> and <a href="htt...
32254
2023-09-03T23:10:15.523
<p>For fun I've decided to reverse engineer the Mr Cool IR Remote, and build my own version of it.</p> <p>I've been able to capture the IR sequence for a lot of different button presses. It appears to use a coding scheme similar to the NEC standard, the main difference being it appears to be Msb first. I think it is Ms...
Mr Cool Remote Control Checksum Algorithm
|checksum|
<p>xxteakey for decrypt lua: <code>aaa</code></p> <p><code>xxtea_decrypt</code> function jump to <code>cocos2dx_lua_loader+F6</code> <a href="https://i.stack.imgur.com/Mc7zx.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/Mc7zx.png" alt="1" /></a></p> <p>Press F5 (decompile to pseudocode)</p> <p><cod...
32262
2023-09-05T12:09:24.923
<p>I was trying to recreate <a href="https://drive.google.com/file/d/12EeyaIOId2QRDhMST_akH-34M-APW4a9/view?usp=sharing" rel="nofollow noreferrer">this game</a> because it was down but I really love it.</p> <p>I tried to decompile the apk and I got the java code and the assets then I looked around the code and found ou...
Need help decrypt xxtea encrypted Lua file from cocos2D game
|decryption|apk|lua|
<p>the best you can get: <a href="https://github.com/yuv422/skifree_decomp" rel="nofollow noreferrer">https://github.com/yuv422/skifree_decomp</a></p> <blockquote> <p>A source code reconstruction of the 32bit version of Skifree (v1.04) back to C, compilable with Visual Studio 6.</p> </blockquote> <p>so someone already ...
32265
2023-09-07T06:42:40.587
<p>I am a person interested of old games (MS DOS and 16 bit Windows only) and programming. In 2020, I saw an article about hacking SkiFree somewhere on the internet and soon as I followed the instructions, it was so easy that I made many games with changed graphics and added sound effects (the later 32 bit executable h...
How can I extract *.c file hidden in an executable file (SkiFree)
|pe|executable|game-hacking|exe|ne|
<p>It's obviously doable (you already noted the <code>Create C header file</code> functionality), but if you want to customize the output, you'll have to code it yourself.</p> <p>Here's what you'll need:</p> <ul> <li><code>ida_typeinf.first_named_type</code> and <code>ida_typeinf.next_named_type</code> to iterate throu...
32271
2023-09-08T06:06:02.693
<p>I want to retrieve IDA Pro .idb database's each type info, such as:</p> <ul> <li><em>size and name of a structure;</em></li> <li><em>each member variable type and name;</em></li> <li><em>each member variable size and offset;</em></li> </ul> <p>And dump it to a .h file in a formatted manner. (&quot;Create C header fi...
Retrieve & dump type information from IDA Pro
|ida|c++|idapython|dumping|script|
<p>@feldspar's <a href="https://reverseengineering.stackexchange.com/a/32338/23491">reply</a> is 100% accurate. It was a change introduced by the Cutter team as of February 2023.</p> <p>I just wanted to add that the important thing here is to understand how the addressing works, regardless of whether it is relative to ...
32317
2023-09-25T05:36:31.707
<p>Look at the first image: <a href="https://i.stack.imgur.com/djnmc.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/djnmc.png" alt="enter image description here" /></a></p> <p>Here what I get is <code>var void *buf @ stack - 0x28</code>. But I'm watching a tutorial there his Cutter shows like this: ...
Cutter shows addresses relative to stack but not rbp. How to change it?
|disassembly|functions|stack|cutter|
<p>Starting <code>A5A5</code> and trailing <code>FFFF</code> should be excluded.<br /> The checksum is just a 16-bit sum of 8-bit bytes.</p> <pre class="lang-none prettyprint-override"><code>A5A5 0018 501A 4D4C 00CC 120D 0008 0003 0002 1201 120D 0245 FFFF FFFF FFFF FFFF ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^...
32345
2023-10-03T02:04:26.173
<p>I am reverse engineering the communication protocol used by Makita XGT (40V) batteries. I have successfully captured a number of messages and have some hints at their basic structure, but they appear to have a checksum of some description at the end of each message, and I'm not really sure how to go about figuring ...
Makita XGT battery/charger protocol checksum
|crc|checksum|communication|
<p>A bit underwhelming way to resolve that problem, but after testing it seems that indeed in these 8 first bytes includes both normals AND tangents. Both are saved as signed bytes. Still cannot understand who decided to spend the same amount of memory just for one UV channel compared to normals and tangents....</p>
32360
2023-10-05T03:45:51.830
<p>I'm trying to decode a vertex format that is used by the assets of a 3D application.</p> <p>I've identified the 0x24 stride. Every section starts with the position of the vertex, that is 3 32bit floats + 1 0xFFFFFFFF for as the fourth component/padding whatever that is. Then, then there are another 2 32bit float whi...
Trying to decode a vertex format
|graphics|vertex-buffer|
<p><code>SeedEncrypt</code>'s code is <a href="https://developer.arm.com/documentation/dui0068/b/Writing-ARM-and-Thumb-Assembly-Language/Overview-of-the-ARM-architecture/Thumb-instruction-set-overview" rel="nofollow noreferrer">ARM Thumb</a> code, a compressed subset of the ARM istruction set with 2-byte opcodes.</p> <...
32363
2023-10-05T11:54:18.563
<p>i'm dissassembling an arm shared object and i'm seeing this line:</p> <pre><code>iVar1 = SecurityAccess(param_2,SeedEncrypt + 1,0x1); </code></pre> <p>the SecurityAccess SeedEncrypt is:</p> <pre><code>int SecurityAccess(int param_1,void *param_2,uint param_3) </code></pre> <p>and the SeedEncrypt function signature...
What does adding to a function pointer do?
|ghidra|
<p>operator precdence 0xffffffff==somevalue will naturally be false or 0</p> <pre><code>0:000&gt; ? poi(@rbx) Evaluate expression: 8388357042652472396 = 74696e49`7072644c 0:000&gt; ? poi(@rbx) &amp; 0`ffffffff Evaluate expression: 1886544972 = 00000000`7072644c 0:000&gt; ? poi(@rbx) &amp; 0`ffffffff == 7072644c Evaluat...
32367
2023-10-06T06:10:11.217
<p>I want to set a conditional breakpoint on function argument at the entry of a function. Here is the value I want which is c0 a8 89 01. I want to break the function when that register holds this specific value</p> <pre><code>2: kd&gt; db @rdx ffffae86`ee4ec024 c0 a8 89 01 c0 a8 89 b4-00 35 e6 d2 00 3a 51 ae ..........
windbg conditional breakpoint equal always get 0
|windbg|breakpoint|
<p>This is what I have done in similar cases but adapted to your scenario:</p> <ul> <li>Build the new open source library as a standard SO or DLL that is loadable by your target. If you're unlucky, you might need to use an old compiler...</li> <li>Patch the entry point of your target to load the SO/DLL as soon as it's ...
32369
2023-10-06T13:37:56.533
<p>I'm dealing with a reverse engineering challenge involving a binary application that was statically compiled with a legacy library. While the legacy library is not vulnerable, it lacks certain features that would significantly improve the functionality of the binary. Importantly, I have access to the open-source cod...
Updating legacy library in an already compiled binary
|c++|c|linux|elf|patching|
<p><em>Note: I also posted this answer at the following ROMHacking.net forum post: <a href="https://www.romhacking.net/forum/index.php?topic=37808.msg449648#msg449648" rel="nofollow noreferrer">Re: Figuring a CRC to edit a PS1 save file</a></em></p> <p>It looks like the &quot;hash&quot; function is just a simple 32-bit...
32380
2023-10-08T16:56:27.443
<p>So I've set myself the goal of editing Crash Bash saves for the PS1. I'm using RetroArch + PCSX, so I'm editing memory card .srm files binary contents directly.</p> <p>Uploaded a zip with some save games, in case you want to look at them: <a href="https://drive.google.com/file/d/1xZgQGt4MmSoduK5lWjAT1osa1hBEbsEE/vie...
Figuring a CRC to edit a PS1 save file
|crc|game-hacking|checksum|
<p>This is an example of optimizing a <em>tail call</em> - a call to another function which is done as the last statement of the current function. Because the LR (link register) has not been modified, the ret/blr of the destination function will directly return to the caller of the stub.</p>
32383
2023-10-11T19:17:16.237
<p>I'm analyzing some functions I see in Machos binaries and I see that whenever there's <code>bl</code> instruction to an objective-c stub function that resides in the <code>__objc_stubs</code> section and in that function there's eventually a call with <code>br</code> instruction to the <code>_objc_msgSend</code> sym...
Objective-C stub functions on AARCH64
|arm|mach-o|arm64|
<p>Right-click <code>i</code> and select either:</p> <ul> <li><code>Create new struct type</code> to create a new type deducted from <strong>function-scoped</strong> access to the variable</li> <li><code>Convert to struct *</code> to apply an existing type</li> </ul> <p>You can inspect and manage structure types in <co...
32389
2023-10-13T02:39:06.470
<p>I'm working on a windows program which is walking PEB Ldr list. the related types are as follows:</p> <pre><code>struct LDR_DATA_TABLE_ENTRY { LIST_ENTRY InLoadOrderLinks; // offset = 0, size = 0x10 LIST_ENTRY InMemoryOrderLinks; // offset = 0x10, size = 0x10 // ... UNICODE_STRING FullDllNa...
How to convert variable to struct member in IDA?
|ida|windows|pe|
<p>You can use the tool mentioned here: <a href="https://github.com/hu60t/hu60wap6/files/6206916/Huawei.configuration.encryption.and.decryption.tools.zip" rel="nofollow noreferrer">https://github.com/hu60t/hu60wap6/files/6206916/Huawei.configuration.encryption.and.decryption.tools.zip</a></p> <p>Reference: <a href="htt...
32414
2023-10-22T02:37:05.593
<p>I have a Huawei hg8245h modem and unfortunately, I have forgotten my sip phone password and my ISP does not provide it to me. I have downloaded the modem configuration and this is the section related to the SIP password:</p> <pre><code>&lt;SIP AuthUserName=&quot;XXXX&quot; AuthPassword=&quot;XXXX&quot; URI=&quot;&qu...
I need to decipher my Huawei hg8245h modem sip phone password
|decryption|router|
<p>seems like I finally found it:</p> <p>CRC is calculated with polynomial 0x2F, inital 0xFF and final 0xFF. As data are the bytes 1 to 7 used and as an 8th byte the value from table for the current message for the current counter value. Yes, there is one table for each message (Unique identifier array for the CRC calc...
32421
2023-10-23T07:44:18.633
<p>I have the same situation as in question <a href="https://reverseengineering.stackexchange.com/questions/20484/crc8-reverse-engineering">CRC8 reverse engineering</a>. But changing the final XOR value seems not to solve my problem and reveng does not help as well.</p> <p>I am copying the text from the original questi...
CRC8 CAN message reverse engineering II
|crc|
<p>Cmake Version</p> <pre><code>D:\&gt;cmake --version cmake version 3.28.0-rc3 CMake suite maintained and supported by Kitware (kitware.com/cmake). </code></pre> <p>rust version</p> <pre><code>D:\&gt;cargo -V cargo 1.73.0 (9c4383fb5 2023-08-26) </code></pre> <ol> <li>create a project directory md dir</li> <li>ini...
32430
2023-10-24T16:54:17.340
<p>I'm working on a project related to Process Injection for learning Rust. I have to inject shellcode at some points and use the Keystone engine for assembling shellcode from source.</p> <p>I detected that the rust bindings were not successful assembling <code>syscall; ret</code> shellcode.</p> <p>I then tried to repr...
Keystone rust bindings error when assembling "syscall; ret" shellcode
|assembly|
<p>Your toolchain probably does not support VLE (AFAIK it was never mainlined), so you’ll need a fork with VLE support (e.g. from <a href="https://www.nxp.com/design/software/development-software/s32-design-studio-ide/s32-design-studio-for-power-architecture:S32DS-PA?#design-resources" rel="nofollow noreferrer">Freesca...
32440
2023-10-26T12:04:31.207
<p>I am trying to disassemble PowerPC dump with <code>objdump</code>. I have only raw binary dump, not ELF or any other 'container'.</p> <p>Unfortunately, I cannot find any option to force VLE mode (my binary definitely uses it).</p> <p>This one is just a short example:</p> <pre><code>~$ objdump -b binary -EB -m powerp...
PowerPC disassemble with objdump
|objdump|powerpc|
<p>Probably this DAT_4c447798 is a pointer and it should point to the string.</p> <p>Ghidra acts much better, if you specify that some memory areas are constant. In the menu check <code>Window</code> -&gt; <code>Memory map</code> and remove ticks at <code>W</code> column for all areas where your code does not wrote to....
32474
2023-11-06T09:09:37.857
<p>I asked exactly the same question <a href="https://stackoverflow.com/questions/77429840/convert-a-memory-location-to-string-in-ghidra">here</a>, but later I figure out this community and found out this helpful to ask it here as well.</p> <p>I would like to have a decompiled pseudo-code in <code>Ghidra</code> like:</...
convert a memory location to string in Ghidra
|ida|ghidra|
<p>I found the answer <a href="https://www.pnfsoftware.com/jeb/manual/dev/introducing-jeb-extensions/#scripts-vs-plugins" rel="nofollow noreferrer">here</a>.</p> <p>Scripts...</p> <blockquote> <ul> <li>Implement IScript</li> </ul> <ol> <li>Example: modify some code, navigate somewhere, display some info, etc.</li> </ol...
32475
2023-11-06T11:35:08.813
<p>I've downloaded JEB CE (community edition) and according to the <a href="https://www.pnfsoftware.com/jeb/#features-matrix" rel="nofollow noreferrer">feature matrix</a>, it supports both script and plugin functionality:</p> <p><a href="https://i.stack.imgur.com/Th6bK.png" rel="nofollow noreferrer"><img src="https://i...
JEB Community Edition - Difference between Script vs Plugin?
|jeb|
<p>Yes, you are right: <a href="https://en.wikibooks.org/wiki/X86_Assembly/GNU_assembly_syntax#Operation_Suffixes" rel="nofollow noreferrer">Operation suffixes</a> on wikibooks.</p>
32479
2023-11-07T11:25:14.857
<p>I'm trying to understand suffixes used for the AT&amp;T syntax for the x64 assembly used for instruction mnemonics.</p> <p>For regular cases:</p> <pre><code>'b', // 8_bit 'w', // 16_bit 'l', // 32_bit 'q', // 64_bit 't', // 80_bit </code></pre> <p>Examples: Intel vs AT&amp;T:</p> <pre><code>inc w...
Mnemonic suffixes for x86-64 assembly for AT&T syntax
|assembly|x86-64|intel|
<p>Fortunately it reappeared once I open ida64 in GUI mode!</p>
32487
2023-11-10T04:53:21.743
<p>I Got IDA Pro license and for some reason ida.reg file from my home/.ida directory got deleted and now I just can't run ida and instead I get following displayed -</p> <p><a href="https://i.stack.imgur.com/ZA5Hj.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/ZA5Hj.png" alt="enter image descriptio...
My ida.reg file got deleted, is there any way to restore ida?
|ida|idapython|
<p>The return address has been placed below the buffer on the stack. I presume it's the 0x55000008e0 entry in your second screenshot. This means that you won't be able to overwrite the return address via the buffer overflow.</p> <p>See <a href="https://stackoverflow.com/questions/68774522/arm64-buffer-overflow-cannot-o...
32492
2023-11-10T18:20:02.113
<p>I'm trying to exploit a buffer overflow vulnerability in an ARM64 program from <a href="https://ad2001.gitbook.io/a-noobs-guide-to-arm-exploitation/introduction-to-stack-buffer-overflows#redirecting-the-execution" rel="nofollow noreferrer">this blog</a>. When I give as input 100*'A', and I compile the program for AR...
ARM64 Stack Layout - Why 100x'A' Doesn't Crash?
|disassembly|c|exploit|buffer-overflow|arm64|
<p>From <a href="https://www.hex-rays.com/products/ida/support/idadoc/1165.shtml" rel="nofollow noreferrer">IDC: Predefined symbols</a> (emphasis mine):</p> <hr /> <p>The following symbols are predefined in the IDC preprocessor:</p> <pre><code> _NT_ IDA is running under MS Windows _LINUX_ IDA is run...
32500
2023-11-14T08:39:15.547
<p><a href="https://hex-rays.com/blog/igors-tip-of-the-week-141-parsing-c-files/" rel="nofollow noreferrer">IDA has the ability to parse C header files</a> (by now a secondary option based on Clang also exists). It is useful to get structs and enums into your database via the Local Types view.</p> <p><strong>Question:<...
When parsing a C header file in IDA, is there a preprocessor symbol I can use to detect it?
|ida|
<p>This may be related to automotive. I had seen something like this in <a href="https://github.com/ea/bosch_headunit_root/blob/main/README.md" rel="nofollow noreferrer">this</a> repository, strings including /dev/registry/LOCAL_MACHINE/SOFTWARE/BLAUPUNKT are mentioned directly <a href="https://github.com/ea/bosch_head...
32505
2023-11-17T15:18:11.913
<p>When trying to determine the filesystem of a firmware image using binwalk, I encountered a strange combination. The binwalk is returning a lot of Unix paths, but some of them contain a typical windows-style registry.</p> <pre><code>3157752 0x302EF8 Unix path: /dev/ffd/DNL 3159348 0x303534 U...
Unix system with windows-style registry
|windows|linux|binwalk|
<p>Compilers may align function addresses to some boundary as part of the optimization process.</p> <p>When doing this, the gap between functions is filled with padding bytes that might accidentally run as code, should something go wrong with the program's flow.</p> <p>Most common are <code>0xcc</code> for <em>debug</e...
32547
2023-12-05T13:05:18.283
<p>First, sorry for my bad english.</p> <p>What I know about 0xCC instruction is a breakpoint instruction.</p> <p>But, when I see x64 binary, each functions are seperate by multiple 0xCC instructions.</p> <p>I think x64 uses 0xCC instructinon as not only breakpoint but also function's serperator.</p> <p>So, what 0xCC i...
What is 0xCC between each functions?
|x86-64|packers|
<p>I'll post an answer here with the conclusions we came to in the chat, in case anyone finds it useful in the future.</p> <p>There seems to be a limitation of the Instruction Pattern Search tool in that the patterns must contain a fixed amount of bytes. In the screenshot posted in the original post, the second and fou...
32572
2023-12-14T10:15:51.130
<p>I'd like to identify in Ghidra a specific sequence of instructions, which I get from MSVC Debug in Visual Studio compiling my own function:</p> <p><a href="https://i.stack.imgur.com/rMoq1.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/rMoq1.png" alt="enter image description here" /></a></p> <p>Wh...
How to search a sequence of instructions in Ghidra?
|c++|ghidra|msvc|
<p>The comments in green, XREFs, are all of the references to that function that Ghidra could identify. Start with those to find what you are looking for.</p>
32592
2023-12-21T14:07:48.673
<p>Let says my Program use this <code>FUN_180811be0</code> function, discovered by disassembling the code within Ghidra:</p> <p><a href="https://i.stack.imgur.com/zWeuT.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/zWeuT.png" alt="enter image description here" /></a></p> <p>Where do I locate the po...
How can I locate where a specific function is being called within the Program using Ghidra?
|ghidra|
<p>You can modify breakpoint conditions from Debugger -&gt; Breakpoints -&gt; Breakpoint List, selecting a breakpoint that you wish to edit, and pressing Ctrl + E. IDA provides some information on modifying breakpoints (incl. conditions):</p> <ul> <li><a href="https://hex-rays.com//products/ida/support/idadoc/1407.shtm...
32629
2024-01-10T15:35:38.380
<p>How to set breakpoint condition that checks certain address value, for example: 0xD526C122 = FF.</p> <p>How can I make a counter that counts how many times breakpoint condition was met without actually breaking the program?</p>
IDA breakpoint condition
|ida|breakpoint|
<p>This obj (or omf) file is an assembled 8086 executable that should contain executable code (no headers).</p> <p>IDA Pro can disassemble it, but the free version won't.</p> <p>Ghidra can handle it.</p> <p>You may have to select the processor type manually and/or set the loading address (0x100).</p>
32637
2024-01-12T13:35:31.277
<p>I'm new to programming and recently studying an ancient DOS assembly program written for 80186 and assembled with MASM. There are some .obj files that I want to open and take a look. I tried obj2asm.exe and IDA 5.0 (freeware version), but both programs could not deliver accurate results. As far as I know those .obj ...
how to diassemble an .obj file
|assembly|disassemblers|
<p>The whole problem is that all versions of objdump and even llvm-objdump incorrectly disassemble 32-bit instructions of C-SKY processors, I managed to find a working objdump version 2.27 on the website <a href="https://www.xrvm.cn/" rel="nofollow noreferrer">https://www.xrvm.cn/</a> there is also an Eclipse-based IDE...
32676
2024-01-29T04:41:50.730
<p>can you tell me why objdump does not correctly disassemble the firmware for the C-SKY (ck803s) processor? what is .long: between the lines, unknown instructions? or am I setting the parameters for objdump incorrectly? here are mine: ./objdump -D -b binary -m csky:cs803 -EL firmware.bin</p> <p><a href="https://i.stac...
Firmware disassembler for c-sky processor (ck803s)
|firmware-analysis|
<p>As hinted by Ali, this info is stored in the global <code>inf</code> structure. It used to be an actual global variable accessible via the <code>idaapi.cvar</code> wrapper, but now you need to use the various getters/setters in the <a href="https://hex-rays.com//products/ida/support/idapython_docs/ida_ida.html" rel=...
32678
2024-01-30T02:09:04.820
<p>so, I'm writing a script to automate analysis, and the code I'm working with is 64bit.</p> <p>the <strong>pointer size</strong> field shown here is the wrong one:</p> <p><a href="https://i.stack.imgur.com/WR3wr.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/WR3wr.png" alt="enter image description...
How to change default pointer size in IDA Pro
|ida|idapython|binary|compilers|
<p>You have to:</p> <p>1. Load the DLL into your process. In runtime, Windows' <code>LoadLibrary</code> api, will load the DLL and return a handle, which is the base address for the loaded module.</p> <p>2. Get the address of the function you want to call from the <code>.pdb</code>, either manually or by using the prov...
32679
2024-01-30T09:20:56.963
<p>I'm new to reverse engineering and recently met with a problem:</p> <p>I have the dll and pdb of a debug version third party module, but I don't have its source codes. Now I want to write a piece of C++ code to test the stability and efficiency of the interfaces of the module, among which the functions are mainly un...
How to call unexported function in a third party DLL while having its PDB?
|c++|dll|functions|pdb|
<p><code>RuntimeException</code> is an Exception class like all the others, the only difference is that developers are not forced to catch <code>RuntimeException</code> and its child classes. And there is no special relation between <code>RuntimeException</code> and &quot;native calls&quot; (JNI calls).</p> <p>Your pro...
32682
2024-01-31T12:35:59.180
<p>I tried to find out how <a href="https://developer.android.com/reference/java/lang/RuntimeException" rel="nofollow noreferrer">RuntimeException</a> works internally in <a href="https://cs.android.com/" rel="nofollow noreferrer">cs.android.com</a> so I can understand how to prevent crashes but didn't find anything us...
How to hook RuntimeException to prevent crashes?
|android|java|frida|exception|
<p>This is most likely a &quot;wide character&quot;, <code>wchar_t[]</code> type.</p> <p>These are always 16 bits long and they are used to allow international characters and symbols that are at most 16 bit long, that is, the UTF-16 range.</p> <p>The fixed length allows faster processing than multibyte unicode.</p> <p>...
32708
2024-02-06T23:53:51.377
<p>I've seen this multiple times, through various apps and snooping of hex values. Character strings but every other value is actually a null byte. This particular example is with API Monitor, but I'm almost positive I've seen it through hexdumps of Windows or DOS executables.</p> <p><a href="https://i.stack.imgur.com/...
Why are these strings padded every other byte?
|disassembly|windows|executable|
<p>You don't need external tools. Mitmproxy since version 9 has <a href="https://mitmproxy.org/posts/wireguard-mode/" rel="nofollow noreferrer">built-in WireGuard support</a> which allows you to use the official <a href="https://play.google.com/store/apps/details?id=com.wireguard.android" rel="nofollow noreferrer">Wire...
32714
2024-02-08T17:51:08.280
<p>I want to capture packets from Android apps. I need an packets forwarder on phone that creates a VPN to redirect all TCP packets to PC, then capture them with 'mitmproxy'. I want to use mitmproxy because it supports python addons, and it's free/opensource.</p> <p>But I can't find a suitable packet forwarder. Here ar...
Looking for a packet forwarder on Android that redirects all packets to PC
|android|packet|
<p>(reposting as an answer)</p> <p>IDA uses FLIRT signatures to try and identify known library functions.</p> <p>Functions found in this way would normally be marked as <em>library function</em>s and will be displayed in IDA disassembly with a different color.</p>
32715
2024-02-08T18:03:16.507
<p>I'm currently researching how a certain malware works and patches some stuff in a certain Android's library.</p> <p>Inspecting the library -which is stripped- in IDA I was able to get the symbol for a certain function in it, but I can't get it through any other means (like <code>objdump -T -t</code>, <code>nm</code>...
Where is IDA getting this symbol?
|ida|c++|elf|symbols|
<p><strong>UPD.:</strong> I found it. It is indeed in Visual Studio Professional installation CD drive. <a href="https://i.stack.imgur.com/XGRJ7.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/XGRJ7.png" alt="source" /></a></p>
32741
2024-02-17T09:23:00.157
<p>I want to see MSVCRT's implementation details for the old Microsoft Visual Studio C++ 6.0 compiler. On newer Visual Studio versions, it is located in <code>/VC/crt/src/</code> directory, but there is no such directory for MSVC 6.0. Where can I find it?</p>
Where to find the Visual C++ 6.0 CRT Source Code?
|c++|msvc|
<p>After testing several methods, the easiest ended up being TitanHide.</p> <p>With TitanHide, setting only ThreadHideFromDebugger:</p> <p><a href="https://i.stack.imgur.com/VrwIg.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/VrwIg.png" alt="enter image description here" /></a></p> <p>And enabling ...
32750
2024-02-21T04:29:43.390
<p>I'm trying to debug a game and it's closing under few circumstances:</p> <ul> <li>When debugging (solved by hooking IsDebuggerPresent to return false when called by the game)</li> <li>When setting a memory/hardware breakpoint to see what reads/writes</li> </ul> <p>Testing with x64dbg and cheat engine, I'm getting th...
How can I debug if the program closes directly?
|debugging|c++|x64dbg|cheat-engine|
<p>The debugger/CPU doesn't have a feature to break when it notices a particular opcode byte sequence. Ahead of time, you can scan the memory range you're interested in, then set a software breakpoint on all those particular spots. You can use the 'findall' or 'findasm' scripting command to add a breakpoint, or take so...
32765
2024-02-25T13:34:22.333
<p>Is there any way to break on specific opcode in X64DBG? For example i want to break on start of a function which is</p> <p>55 | push ebp</p> <p>8BEC | mov ebp,esp</p> <p>can i set a breakpoint like opcode == 0x00EC8B55? Also is there any way to break only on certain memory range?</p>
X64DBG Conditional Breakpoint on Specific Opcode?
|assembly|malware|x64dbg|unpacking|
<p><strong>Solved by changing the signature:</strong></p> <pre><code>typedef std::string*(__thiscall* _readFileContents)(DWORD* _resourceManager, std::string* buffer, std::string&amp; fileName, bool safe); </code></pre>
32772
2024-02-28T08:55:53.460
<p>I'm hooking a function that reads and decrypt files and my idea is to read the buffer once it's decrypted:</p> <pre><code>typedef void(__thiscall* _readFileContents)(DWORD* _resourceManager, std::string* buffer, std::string&amp; fileName, bool safe); _readFileContents original_readFileContents; DWORD gateway_readFil...
Hook: can call string::size() but crashing when reading string data... how to read without crash?
|c++|function-hooking|strings|
<p>Signextend is expanding an integer of some size into a larger size and filling the extra bits with the original sign bit. In other words - keeping the larger int positive/negative.</p> <p>Example:</p> <p>An original 8-bit number <code>0x7F</code> (Binary <code>01111111</code>) signextended to 32 bit becomes <code>0x...
32792
2024-03-07T06:36:55.520
<p>I’m writing a C-SKY (CK803S) processor module for IDA Pro, and a question arose about offsets in transitions, small ones are fine, but long ones lead to nowhere, from the documentation: <a href="https://i.stack.imgur.com/CYqWE.jpg" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/CYqWE.jpg" alt="enter i...
Offset addressing
|ida|disassembly|assembly|debugging|binary-analysis|
<p>Some general steps that might help you in your process are:</p> <ol> <li>Taking the unit apart and looking up the datasheet for each IC from the ports to the CPU.</li> <li>If the above doesn't work, try googling the unit to see if the protocol is documented somewhere or if someone has already reverse engineered it.<...
32803
2024-03-13T02:31:18.690
<p>I Have an ultrasonic machine that has a cartridge with a set amount of uses. When that value gets to 0, the cartridge has to be disposed, and a new one bought. The thing is that with some maintenance before the cartridge runs out of uses, it's possible to prevent it from being damaged, and it's life can be extended ...
Reverse Engineer an ultrasonic cartridge communication with the station to bypass remaining uses
|serial-communication|protocol|checksum|
<p><code>x/d</code> reads the value starting at some address and display it as decimal.</p> <p>If you don't specify a size, <code>x</code> will use the default or the last size used.</p> <p>Your first <code>x/d</code> reads the default size - a word (typically 4-bytes).</p> <p>Then <code>x/s</code> reads a string, that...
32812
2024-03-17T13:13:51.163
<p>I have run the following commands at a breakpoint in gdb and I don't understand how the x/d $rdx commands returns two different values, one before and one after x/s $rdx is executed. To my understanding x is just for reading values?</p> <pre><code>(gdb) x/d $rdx 0x555555559180: -6681 (gdb) x/s $rdx 0x555555559180: &...
Why does the value stored in a register change after an x/s call? (GDB)
|gdb|
<p>The problem is that Ghidra for whatever reason cannot determine what the actual target of this call is. This might just be a limitation of the C++ support in Ghidra. There are plugins that try to support this better:</p> <ul> <li><a href="https://github.com/astrelsky/Ghidra-Cpp-Class-Analyzer" rel="nofollow noreferr...
32837
2024-03-25T19:48:46.193
<p><a href="https://i.stack.imgur.com/ZeAXk.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/ZeAXk.png" alt="enter image description here" /></a></p> <p>On lines 67, 70 and 77 ghidra makes a call to what I assume is a member function, but it does not show me which member function. Why is that?</p> <p>...
Ghidra not displaying member function call
|ghidra|pe|
<p>This is an industrial type <code>ITT Cannon KPT01E12-10S</code>, like this one:</p> <p><a href="https://www.westfloridacomponents.com/C069APP10/KPT01E12-10S+10+Pos.+Circular+Connector+Receptacle+ITT+Cannon.html" rel="nofollow noreferrer">https://www.westfloridacomponents.com/C069APP10/KPT01E12-10S+10+Pos.+Circular+C...
32845
2024-03-28T19:32:04.797
<p>Does anybody know this kind of connector? It is used as a diagnostic connector on diesel engines. Inner diameter 15mm, outer 19mm.</p> <p><a href="https://i.stack.imgur.com/SLTqc.jpg" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/SLTqc.jpg" alt="Female socket" /></a></p>
What's this connector type?
|hardware|
null
32852
2024-03-30T03:43:20.430
<p>I've been attempting to dive into mediaserverd which runs on iOS. Pulling the binary and running <code>otool -L</code> on it reveals, unsurprisingly, that it's linked against <code>/System/Library/Frameworks/CoreMedia.framework/CoreMedia</code>. However, that directory on the phone doesn't have any file called <co...
Location of CoreMedia framework
|ios|
<p>You can use any binary dynamic instrumentation framework (like Intel pin, Frida, etc.)</p> <p><a href="https://github.com/SideChannelMarvels/Tracer/blob/master/TracerPIN/README.md" rel="nofollow noreferrer">https://github.com/SideChannelMarvels/Tracer/blob/master/TracerPIN/README.md</a></p> <p><a href="https://frida...
32853
2024-03-30T16:50:16.293
<p>I would like to alter the behavior of some executable (in my case, a videogame). One way of doing this is to hook function calls (e.g., a function like <code>Player::ReceiveDamage</code>) and adjust parameters/return values.</p> <p>I know how to inject code and how to hook functions. <strong>The challenge currently ...
Tracing all functions in executable conditionally, to find function of interest
|pe|tools|dynamic-analysis|functions|tracing|