07.02.2015 Views

The Art of Reversing by Ap0x - Tutoriali.org

The Art of Reversing by Ap0x - Tutoriali.org

The Art of Reversing by Ap0x - Tutoriali.org

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

kada ce se u EAXu pojaviti user32.dll string. Znaci da je na red doslo<br />

otpakivanje IATa u memoriju pa cemo potraziti loop koji ce to uraditi. On se<br />

nalazi ovde:<br />

00406252 83C7 04 ADD EDI,4<br />

00406255 ^ EB BD JMP SHORT cr-cdl41.00406214<br />

to jest ovo je poslednja adresa loopa koji sluzi za otpakivanje API poziva u<br />

memoriju, dok se odmah ispod nalazi drugi skok:<br />

00406257 83C2 14 ADD EDX,14<br />

0040625A ^ E9 55FFFFFF JMP cr-cdl41.004061B4<br />

koji sluzi za otpakivanje imena svih dll fajlova koji sadrze otpakovane API<br />

pozive. Zbog ovoga cemo postaviti dva breakpointa na adrese:<br />

004061C2 0385 47050000 ADD EAX,DWORD PTR SS:[EBP+547]<br />

004061C8 52 PUSH EDX ; cr-cdl41.00404014<br />

da bismo videli imena dll fajlova koja se nalaze u IATu. Treba nam jos jedan<br />

breakpoint za slucaj da pritisnemo F9 jednom vise puta nego sto treba. Zbog<br />

ovoga cemo postaviti breakpoint na adresu:<br />

0040625F 8B85 57050000 MOV EAX,DWORD PTR SS:[EBP+557]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!