Questions tagged [debugging]
Process of analyzing live programs through software (e.g. ptrace) or hardware (e.g. JTAGs) devices.
632 questions
0
votes
0
answers
18
views
Kernel object code coverage?
I research kernel object (ko file that loaded into kernel) in Android aarch64 .
Is there any way to make code coverage to kernel object? That ko don't print any log to kmesg.
Maybe is there any way to ...
0
votes
0
answers
59
views
Nvidia DLSS data extraction - IDAPro
I have a display from TurzX where I can display CPU, GPU, etc info. I want to show the DLSS version and preset in the display. The reason for this is I just want to disable the in-game DLSS overlay ...
0
votes
1
answer
287
views
Code injection to system process(lsass.exe)
I allocated an RWX (PAGE_EXECUTE_READWRITE) memory region inside LSASS.exe (i tried a RX codecave), then wrote my shellcode there.
After that, I tried to execute my shellcode via NtQueueApcThread → ...
0
votes
0
answers
77
views
How to un-pack kkrunchy packed executable files?
I like a demo from a demoscene site called pouet.net, i want the source code of that file. i try to unpack the demo exe file with upx but it cannot unpack with it, because it is packed with so called ...
0
votes
0
answers
75
views
Bypass Update Prompt to Run Main Program
a software called Android Utility v175 https://www.mfdl.io/
it is Checking for Update before redirect to Main Program so i wanted to bypass that update checking or something like to tell software that ...
0
votes
0
answers
60
views
How could a CRC-15 CAN be transformed into 8 bytes in an embedded system?
I am analyzing calibration binary files of an embedded system (BMS) that likely uses a CRC-15 CAN checksum.
From my firmware and bootloader file analysis, I have found a PECLookup table, which ...
0
votes
0
answers
132
views
Problem with deobfuscation .NET-file, protected with XerinObfuscator, Anti-dnSpy and Anti-Debug
I am trying to analyze a .NET file that I suspect is malicious. The file is protected by XerinObfuscator and also has Anti-dnSpy and Anti-debug protection. I tried to use de4dot to deobfuscate it, but ...
0
votes
1
answer
216
views
How can I compare different execution traces of the same exe, but ran with different parameters?
Context
I'm working on analyzing how a software's behavior changes when run with different parameters.
My goal is to compare the execution traces (e.g., function calls, memory accesses, or instruction ...
1
vote
1
answer
94
views
Modifying CreationFlags in CreateProcessA with OllyDBG2 with CREATE_SUSPENDED
I am trying to attach the OllyDBGv2 debugger to an external program that is created by CreateProcessA found in a win32 based binary but I strongly suspect that the process is created/ran and ...
0
votes
1
answer
204
views
How can I compile an EXE with GCC such that the .idata and .text sections are merged together?
Given this classic helloworld.c example,
#include <stdio.h>
int main()
{
printf("Hello world!\n");
}
Under normal circumstances, a compiled EXE file consists of several sections, ...
1
vote
1
answer
73
views
Dynamic analysis of Android applications' interaction
There are two or even more Android applications that somehow interact with each other:
Application A invokes application B or sends request to it directly or via third application C. I don't have the ...
1
vote
1
answer
132
views
Attaching into an x86 process in windbg
How can I attach into an x86 process from windbg?
currently I am waiting for the process to load then I am breaking into wow64cpu!KiFastSystemCall to switch into x86 context and only then put bp to ...
2
votes
2
answers
112
views
What's the best way or approach to debug binary Linux library?
I've got a header file (I know the functions and have some documentation) and a .so file:
From a wrapper library and from context, I need to call "Connect", but it does not work, just fails ...
1
vote
1
answer
135
views
Tips for reverse engineering Common Lisp (SBCL) ELF binary
I got to the task of reverse engineering the ELF binary. I found out that it is a compiled SBCL. I have no idea how to do static or dynamic analysis, any tips (where to start, I found basically ...
0
votes
0
answers
84
views
How to use reverse engineering to learn how facebook send messages?
I would like to know how I can use reverse engineering technique to learn how Facebook/messenger send messages? I were analyzing my developer tools network tab, but couldn't find anything. Fiddler ...
3
votes
1
answer
215
views
How can I set up a conditional breakpoint for the CreateFileW function for when a specific file/path is read in x64dbg?
I'm currently debugging a program using x64dbg, and I'm struggling to set up a conditional breakpoint on the CreateFileW function:
HANDLE CreateFileW(
[in] LPCWSTR lpFileName,...
0
votes
1
answer
93
views
Offset addressing
I’m writing a C-SKY (CK803S) processor module for IDA Pro, and a question arose about offsets in transitions, small ones are fine, but long ones lead to nowhere, from the documentation:
in code I ...
0
votes
0
answers
118
views
How to get decryption keys from an offline player?
I am just starting to learn reverse engineering from lena lectures.
I have 2 encrypted sample vids and an offline player which is able to decrypt the videos and play them, is there any way,I can get ...
0
votes
2
answers
217
views
How can I debug if the program closes directly?
I'm trying to debug a game and it's closing under few circumstances:
When debugging (solved by hooking IsDebuggerPresent to return false when called by the game)
When setting a memory/hardware ...
0
votes
0
answers
58
views
How can I find the part of cmd.exe that processes windows batch commands before they're executed?
I'm able to find the ReadConsoleInputW commands for pause and reading input for commands but I'm unable to find the actual processing of the commands. I'm using x64dbg but I'm fairly new to Reverse ...
0
votes
1
answer
275
views
APK/Apktool If I decompile and recompile sources the app does not start
I'm trying to reverse an apk but there is a strange thing that happens, probably something new for me, basically if I decompile only the resources (not dex files) and recompile it zipalign/sign, the ...
1
vote
0
answers
98
views
Freeware x86 decompilers for Windows with debug? [closed]
I'm searching for a software that is capable of decompiling x86 code in C-like code and run a debug session within it with the possibility to see the content of the variables.
That above was a quick ...
1
vote
0
answers
155
views
Got access to SWD, but I need to identify the chip
I was able to connect to the chip via SWD/openocd, but I can't figure out what chip it is (says SM9PQ1 2322-52 on chip, googled but cant find anything). I'm hoping to download the firmware after I ...
0
votes
0
answers
95
views
Requesting Guidance To Understand SuperScape's .VCA Format: Lego Creator Knights Kingdom
I hope you all are doing well and staying safe.
I am in the process of trying to understand how SuperScape stored data in their .VCA/LCA format, so I can extract the original SHAP and PAL data from ...
2
votes
2
answers
168
views
What is the gdb command equivalent of bp MODULE_NAME+0x12345678 in WinDBG?
What is the gdb command equivalent of bp MODULE_NAME+0x12345678 in WinDBG?
I found this command useful to debug with ASLR (w/o disabling it).
0
votes
0
answers
262
views
Need Help Cracking a Program
So I've got this .exe that I want to crack. It's an old management system for people in truck loading business.
I kind of understand what's happening with window API calls but I'm unable to access the ...
0
votes
1
answer
97
views
IDA Pro: JDWP error: ABSENT_INFORMATION - Desired information is not available
I am trying to debug a dex file from an APK file in IDA Pro. I set some breakpoints when launching the activity. When I start the process, the application waits for the debugger. After some time, IDA ...
0
votes
1
answer
211
views
IDA Pro Debugging GDB SendDbgCommand
I'm following this tutorial here https://www.triplefault.io/2017/07/loading-kernel-symbols-vmm-debugging.html to load kernel symbols with debugging.
Setting up the debug environment with IDA Pro using ...
0
votes
1
answer
131
views
Trying to reverse encypter to decrytper in C. Can't figure out what I'm missing
Goal:
Trying to reverse encrypter to decrypter that successfully decrypts.
This is the pseudo-code of the disassembled encrypting program. There are no function calls, and I've been able to somewhat ...
1
vote
1
answer
436
views
Is a rootful jailbreak necessary to debug imessage with ida pro for <= ios 16.0.3?
In this pdf file written by the great Saleo: https://saelo.github.io/presentations/36c3_messenger_hacking.pdf
Saleo was able to debug the called method names of imessage during runtime with ida pro, ...
1
vote
0
answers
58
views
Retrieve functionality to button - game patching
I'm patching an old game, and I want the retrieve the toggle fullscreen functionality it's supposed to have.
In the menu, in the display tab, there is a disabled option of fullscreen mode that you can ...
1
vote
2
answers
734
views
How can I jump to the start/end of a function in x64dbg?
I'm currently debugging a program using x64dbg, and I'm wondering how to quickly jump to the start or end (prologue/epilogue) of a function while I'm in the middle of it. I couldn't find this ...
2
votes
2
answers
275
views
Debugging of any x86(_64) executable producing strange results under Parallels + Windows on Arm
Recently, I have been experimenting with using an M1 (Arm64) Mac full-time for RE work, including Windows on Arm under Parallels with x86(_64) binaries. From several online sources discussing this use ...
0
votes
1
answer
230
views
How can I debug a UWP application on startup?
I'm trying to debug a UWP application, and break on startup. However, when I start the application with windbg, the breakpoint didn't work.
After further digging I found the process is started by ...
2
votes
1
answer
244
views
Rename a program's button using x64dbg?
I'm trying to change the name of a button, but I can't find anything that references it. I looked for the CreateWindow function in the intermodular calls, but I only found a reference to the main ...
1
vote
0
answers
173
views
How to debug armel and armhf binaries on x86-64 Ubuntu simultaneously?
I'm working on the challenges on ROP Emporium. For the ARMv5 version of the callme challenge, we are given two binaries and two shared libraries: callme_armv5 with libcallme_armv5.so and callme_armv5-...
1
vote
0
answers
70
views
JEB pro is not showing xrefs for native code (arm)
i have this problem when analyzing arm shared object.
when working with IDA pro, it finds all xrefs but in jeb, most of xrefs are missing.
when JEB finfishes, the final analysis lacks most of xrefs. I ...
2
votes
1
answer
246
views
What triggers RIP_EVENT?
The documentation for the Windows Debugger API mentions a debug event called RIP_EVENT. It offers little explanation of what a RIP_EVENT is, only stating that the structure "contains the error ...
0
votes
1
answer
133
views
How to reverse a USB firmware patching tool for another device?
I have a USB device from a vendor (TRENDnet) that has the exact same chipset as a QNAP device with an available firmware patching tool.
It's my belief that this firmware patching tool should work ...
2
votes
0
answers
97
views
Radare2: How to Create a Custom Scripted Panel?
TLDR: How do I get a panel in radare2 to correctly show the output of a radare2 command piped to an external script?
e.g. afvd | python var_displayer.py
This is my current view. Multiple panels, ...
1
vote
1
answer
88
views
Should shell32.dll be in executable search path for winword.exe with WinDBG?
I'm threat hunting and I'm curious if there should be a shell32.dll in the executable search path in windbg for winword.exe.
1
vote
0
answers
107
views
How to develop an anti-debug library which allow users to debug their own programs but not the library?
I'm going to publish a library which guarded by anti-debug ,(ptrace_trackme for Linux and isDebuggerPresent for windows).
The down side of this library is: users would be abled to debug their own ...
3
votes
0
answers
207
views
What is the best emulator/environment for android debugging?
I know the question smells like I want a ready solution but I have been trying many things and after a lot of headaches, still I can't do what I want.
There are fast emulators but they don't provide ...
3
votes
0
answers
98
views
How to unpack emotet with x64dbg and do dynamic analysis?
I am a beginner at malware analysis. I have been trying to analyze Emotet using X64DBG. I followed the steps below and succeeded once, but when I repeated the same steps, I failed. Can you tell me if ...
4
votes
2
answers
343
views
Malware analysis - Debugger hangs at HttpSendRequestA
I'm reverse engineering a malware that at some point tries to connect to http://api.ipify.org in order to get the IP address of the infected PC.
I was able to replicate this behaviour with a small ...
4
votes
0
answers
610
views
How to do live debugging of ARM64 binaries on macOS with M1/M2 chips?
I'm trying to figure out why NSSavePanel fails in my SwiftUI app. I tried every possible documentation, or asking on the Swift programming forums - to no avail.
I'm originally a Windows programmer, ...
3
votes
1
answer
65
views
Can radare2 skip syscall when `db main;dts+;dc`
more detailed see this
In short, I want to skip syscall when recording program, but it seems that the program would always stop after ths syscall.
Hope someone can help me. Thanks.
below is running ...
3
votes
0
answers
114
views
x32dbg version causes crash on breakpoint
i'm a newbie to this whole shindig, and have started with https://gamehacking.academy. i'm finding this fun, but am getting stuck here: when i try to apply a breakpoint using x32dbg, as in https://...
3
votes
0
answers
277
views
PEStudio DLL analysis: flag in export section
I start to use PEStudio for DLL analysis; I understand (more or less) everything, except the "exports (flag)" section:
What does it mean the X in the flag column? So, what is a/the flag?
...
4
votes
0
answers
133
views
API Breakpoints not hitting while debugging a malware using x32dbg
I have been having a really strange issue which I have tried all ways to troubleshoot from my end but was not successful.
I am going through a malware analysis course and following the debugging ...