일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |
- uftrace
- 안티디버깅
- on-stack replacement
- apm
- 난독화
- LLVM
- Linux packer
- Injection
- on stack replacement
- linux debugging
- thread local storage
- pinpoint
- linux thread
- Android
- initial-exec
- Obfuscator
- anti debugging
- Linux custom packer
- OSR
- android inject
- so inject
- v8 tracing
- LLVM Obfuscator
- tracerpid
- tracing
- custom packer
- v8 optimizing
- pthread
- LLVM 난독화
- TLS
- Today
- Total
목록Technic (13)
Why should I know this?
G_SLICE=always-malloc G_DEBUG=gc-friendly valgrind -v --tool=memcheck --leak-check=full --num-callers=40 --log-file=valgrind.log ./test_resolve `which gcc`
"Hello World" in C "Hello World" in C++"Hello World" in Go "Hello World" in Rust $ cat C_hello.c#include int main(){ printf("Hello world\n");} $ cat Cplus_hello.cpp#include using namespace std;int main(){ cout
regs.rip = addr;[injected address] 0x400fb0 instead of expected SIGTRAP, target stopped with signal 11: Segmentation fault (gdb) x/10i 0x400fae [0x7f602fd0173c] [130037] │=> 0x400fae: add %al,(%rax) [0x7f602fd0173c] [150037] │ 0x400fb0: push %rsi [0x7f602fd0173c] [110037] │ 0x400fb1: push %rdx [0x7f602fd0173c] [140037] │ 0x400fb2: push %r9 [0x7f602fd0173c] [160038] │ 0x400fb4: mov %rdi,%r9 [0x7f..