일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |
- initial-exec
- android inject
- LLVM Obfuscator
- anti debugging
- tracerpid
- linux debugging
- so inject
- Obfuscator
- LLVM
- pinpoint
- tracing
- Linux packer
- v8 tracing
- custom packer
- LLVM 난독화
- Android
- on-stack replacement
- apm
- Linux custom packer
- uftrace
- thread local storage
- linux thread
- 안티디버깅
- OSR
- on stack replacement
- pthread
- Injection
- 난독화
- v8 optimizing
- TLS
- Today
- Total
목록Technic (13)
Why should I know this?
G_SLICE=always-malloc G_DEBUG=gc-friendly valgrind -v --tool=memcheck --leak-check=full --num-callers=40 --log-file=valgrind.log ./test_resolve `which gcc`
"Hello World" in C "Hello World" in C++"Hello World" in Go "Hello World" in Rust $ cat C_hello.c#include int main(){ printf("Hello world\n");} $ cat Cplus_hello.cpp#include using namespace std;int main(){ cout
regs.rip = addr;[injected address] 0x400fb0 instead of expected SIGTRAP, target stopped with signal 11: Segmentation fault (gdb) x/10i 0x400fae [0x7f602fd0173c] [130037] │=> 0x400fae: add %al,(%rax) [0x7f602fd0173c] [150037] │ 0x400fb0: push %rsi [0x7f602fd0173c] [110037] │ 0x400fb1: push %rdx [0x7f602fd0173c] [140037] │ 0x400fb2: push %r9 [0x7f602fd0173c] [160038] │ 0x400fb4: mov %rdi,%r9 [0x7f..