07.02.2015 Views

The Art of Reversing by Ap0x - Tutoriali.org

The Art of Reversing by Ap0x - Tutoriali.org

The Art of Reversing by Ap0x - Tutoriali.org

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ARM Protector 0.1<br />

Jos jedan jako zanimljiv paker koji se moze raspakovati bez<br />

stepovanja kroz kod, a u stvari i potrebno je da se to ovako uradi, jer<br />

program detektuje stepping kroz kod. Ali i ovo moze da se resi sa relativno<br />

malo koraka. Meta pakovana ovim pakerom se nalazi u folderu Cas10 a zove<br />

se unpackme3.ARMProtector.exe. Prvi bi bio da sakrijemo Olly od ARMa pomocu<br />

HideOlly plugina. Drugi bi bio podesavanje Ollyja na ovaj nacin:<br />

Posto packer OEP izgleda ovako:<br />

00406000 >/$ E8 04000000 CALL unpackme.00406009<br />

00406005 |. 8360 EB 0C AND DWORD PTR DS:[EAX-15],0C<br />

00406009 |$ 5D POP EBP<br />

0040600A |. EB 05<br />

JMP SHORT unpackme.00406011<br />

ostaje nam da pritisnemo F9 i da dodjemo do sledeceg Exceptiona koji<br />

izgleda ovako:<br />

00407249 8B DB 8B<br />

0040724A 00 DB 00<br />

0040724B EB DB EB<br />

Posto treba da predjemo preko ovog exceptiona pritisnucemo SHIFT+F8, a<br />

onda F8 sve dok se ne izvrsi sledeca linija ASM koda u ntdll.dll fajlu<br />

77FB4DC6 E8 480BFCFF CALL ntdll.ZwContinue<br />

Posle cega cemo se naci na OEPu gde mozemo da uradimo dump i popravku<br />

importa. Sam OEP izgleda ovako:<br />

00401000 . 6A 00 PUSH 0 ; /pModule = NULL<br />

00401002 . E8 0D010000 CALL unpackme.00401114 ; \GetModuleHandleA<br />

<strong>The</strong> <strong>Art</strong> <strong>of</strong> <strong>Reversing</strong> <strong>by</strong> <strong>Ap0x</strong> Page 243 <strong>of</strong> 293

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!