edi 845

Read about edi 845, The latest news, videos, and discussion topics about edi 845 from alibabacloud.com

Linux Compilation example Explanation (ii)--Max

This article explains the use of assembly language to find the maximum value of a set of numbers, mainly related to the knowledge points have data segments, loops and so on.# Purpose: Find the largest number in the program # # Variable: The purpose of the Register # %edi-Save the data item index being checked # %EBX-the largest item currently found # %EAX-Current Data # # Use the following memory location: # Data_ Items-Contain

The masm32 program uses the PE file header information to calculate the file length.

closehandle, hfilePop eax. ElseMoV eax, offset g_szfileopenerror. EndifRETGetpefilesize endp Ispefilemap proc pmapping: DWORDIf d_useseh EQ 1Local seh: sehEndif; d_useseh MoV g_dwvalidpe, falseMoV EDI, pmapping If d_useseh EQ 1Assume FS: NothingPush FS: [0]Pop Seh. prevlinkMoV Seh. currenthandler, offset sehhandlerMoV Seh. safeoffset, offset finalexitLea eax, sehMoV FS: [0], eaxMoV Seh. prevesp, ESPMoV Seh. prevebp, EBPEndif; d_useseh Assume

Virus program source code instance analysis-CIH virus [4]

OnlySetInfectedMark    ; Read all virus block tables Mov eax, ebp; read function number Call edi; read the block table to esi (@ 9)    The following is a complete modification to handle the Winzip self-extracting file error. when you open the self-extracting file, The virus will not be infected. First, the virus obtains the ToRawData pointer of the 2nd block tables, Read the data and determine whether the data contains the "WinZip (R )"    Xchg eax,

Win32 compilation [29]-string commands: movs *, CMPs *, SCAs *, lods *, rep, repe, repne, etc.

Here the "string" is not a single string, including all consecutive data (such as arrays); the string command is only used for memory operations. Move string commands: movsb, movsw, and movsd; from ESI-> EDI; after execution, the ESI and EDI address move the corresponding unit comparison string commands: cmpsb, cmpsw, cmpsd; compare ESI and EDI. After exe

View C ++ from the perspective of assembly (class inheritance)

functions during memory construction and analysis? Copy to clipboardprint? 74: manager m; 00401268 lea ecx, [ebp-4] 0040126B call @ ILT + 60 (manager: manager) (00401041) 75 :} 00401270 lea ecx, [ebp-4] 00401273 call @ ILT + 0 (manager ::~ Manager) (00401005) 00401278 pop edi 00401279 pop esi 004020.a pop ebx 004010000b add esp, 44 h 0040da-e cmp ebp, esp 00401280 call _ chkesp (00408760) 00401285 mov esp, ebp 00401287 pop ebp 74: manager m; 004012

Linux-0.11 Core Source Code Analysis series: Memory management Get_free_page () function analysis

Linux-0.11 Memory Management module is the source of the more difficult to understand the part, now the author's personal understanding publishedFirst hair Linux-0.11 kernel memory management get_free_page () function analysisHave time to write other functions or files:)/* *author:davidlin *date:2014-11-11pm *email: [email protected] or [email protected] *world:the City of SZ , in China *ver:000.000.001 *history:editor time do 1) Linpeng 2014-11-11 Created this file! 2) */Here is the source code

Program loading and Execution (iii)--"x86 assembly language: From the actual mode to the protection mode" Reading notes 23

Loading and execution of programs (iii)--reading notes 23And then the last time the content said.load_relocate_programthe explanation of the process is not over yet, so create a stack segment descriptor and reposition symbol table.Allocating stack space and creating a stack segment descriptor462 ; Creating a program stack segment descriptor463 movecx,[edi+0x0c]; 4KB magnification464 movEbx0x000fffff465 SubEbx,ecxTo get

function calling convention

__stdcall __cdecl __fastcall vc6.0:int __stdcall/__cdecl/__fastcall Add (int x, int y){return x+y;}void Main (){Add (2,3);}1.__stdcall:1:int __stdcall Add (int x, int y)2: {00401020 Push EBP00401021 mov Ebp,esp00401023 Sub esp,40h00401026 push EBX00401027 push ESI00401028 Push EDI00401029 Lea edi,[ebp-40h]0040102C mov ecx,10h00401031 mov eax,0cccccccch00401036 Rep stos dword ptr [edi]3:return X

Analysis of a Trojan sample

It's free. Let's take a look.ODLoad directly as follows: 00414000> $ E8 00000000 call 0041400500414005 $ 5B pop ebx // locate the code00414006.81EB05024000 sub ebx, 00400205 // The code segment length, followed by a variable0041400C. 64: 8B3D 30000000 mov edi, dword ptr fs: [30] // FS [30]-> PEB, locate kernel32.dll00414013. 8B7F 0C mov edi, dword ptr [edi + C] /

Linux Platform x86 compilation (VI): Transfer of data

EAX register to the memory location specified by value. Use the memory location of the variable address. as follows, multi-memory specifies multiple values in one command:values:. int 10,20,30,40,50,60,70this creates a series of data values that are contiguous in memory (similar to an array of high-level languages). When referencing data in an array, you must use the system to determine which memory location you want to access. The memory location is determined by the following expression:base_

C + +: My understanding of the return statement

If you returned a struct object, what would the return statement do? Here is the test code #include using namespace Std;struct BIG{Char buf[100];int i;Long D;}B,B2;Big Bigfun (Big B){b.i=100;return b;}int main (){B2=bigfun (B);return 0;}To set a breakpoint at the beginning and end of main8:int Main ()19: {004012A0 Push EBP004012A1 mov Ebp,esp004012a3 Sub esp,118hPuzzled at first, and analyzed for a long timeThe original (118h-40h) remaining memory block holds two big variablesLow address put bi

Secure return method of Symantec Firewall kernel overflow exploit

that shellcode will be much larger. At the summit because Flashsky Daniel refused to disclose source code, so had to do their own, ample clothing. This period of time due to review make-up (last semester accidentally hung 4 #_#), so dragged for so long. In fact, the code was written very early, is not bothered to write this document. This morning finally made up my mind to spend the morning to finish this document, it is inevitable that there are some mistakes, I hope you point out. Shellcode

Shellcode Getting Started (win)

esi, [edx + 0x3c]; Lea ESI, [edx + esi]; mov esi, [esi + 0x78]; Lea ESI, [edx + esi]; mov edi, [esi + 0x1c]; Lea EDI, [edx + edi]; MOV[EBP-0X04], EDI; mov

Coinitialize Analysis 1

Everyone knows that to use COM components in a program, you must first call coinitialize. This function is mainly used to initialize the com runtime environment. But does the function scope take the thread as the unit or the process as the unit? Maybe you have figured out the answer through the test program. That's right, it's a thread. Today, we will go into a bit more detail and confirm our ideas by analyzing the specific implementation of coinitialize. Let's take a look at coinitialize compil

Making cross-platform Shellcode

]; Lea ESI, [edx + esi]; mov esi, [esi + 0x78]; Lea ESI, [edx + esi]; mov edi, [esi + 0x1c]; Lea EDI, [edx + edi]; MOV[EBP-0X04], EDI; mov edi

NT kernel process scheduling Analysis notes

+ 00000128] In this case, EAX = NextThread (ETHREAD structure) 0008: 80467E17 sub esp, 0C0008: 80467E1A MOV [ESP + 08], ESI0008: 80467E1E MOV [ESP + 04], EDI0008: 80467E22 MOV [ESP], EBP0008: 80467E25 mov esi, EAX0008: 80467E27 mov edi, [EBX + 00000124] Note: CurrentThread (ETHREAD structure)0008: 80467E2D mov dword ptr [EBX + 00000128], 000000000008: 80467E37 MOV [EBX + 00000124], ESI0008: 80467E3D mov ecx, EDI0008: 80467E3F CALL 8042F944 Note: KiRe

Hook swapcontext enumeration of hidden processes (learning notes 4)

Author: bzhkl Time: 2008-12-11,12: 01 Chain: http://bbs.pediy.com/showthread.php? T = 78464 Previously, I tried to detect a hidden process and then solved it with the method of brute force enumeration. But the hook swapcontext didn't see complete code. So I collected some useful modules on the Internet and integrated them to implement support. xp3, xp2 should be supported even if it is not tested. Complete project code Difficulty: there are still some details about obtaining the swapcontext ad

Krypton0.5 main program shelling

is filled, the cmp [Addr] And 0xff will be used to determine whether to check the encryption option for processing. There is Magic JUMP, but the Shell API address has been redirected, and the Patch code needs to be restored.>The code is not optimized, and there is no time to optimize it. There are too many records to analyze the main program.The Patch code is as follows:Code:00B60000 60 pushad00B60001 9C pushfd00B60002 BE 00104000 mov esi, 0x401000 Code segment Addr00B60007 BF 00404000 mov

[Analysis] summarizes three methods of using heap overflow in windows.

at the various flags. Let's take a look at the key points in rtlfreeheap. Key Aspect 1001b: 77fcc829 8a4605 mov Al, [ESI + 05] // ESI points to the start address of the buf2 8-byte management structure, namely, the Al flag001b: 77fcc82c a801 test Al, 01 // whether the flag value contains heap_entry_busy001b: 77fcc82e 0f84a40e0000 JZ 77fcd6d8 // skip if not included. Skip here001b: 77fcc834 f6c207 test DL, 07001b: 77fcc837 0f859b0e0000 jnz 77fcd6d8001b: 77fcc83d 807e0440 CMP byte PTR [ESI + 04],

Multi-precision PI computing Assembly implementation

returned.XOR eax, eaxMoV ESI, LPXMoV ECx, n@@:MoV edX, [ESI + eax * 4]Test edX, EDXJnz exitINC eaxCMP eax, ECxJl @ BMoV eax, 1RETExit:XOR eax, eaxRET_ Iszero endp;-----------------------------------------------------------_ Add proc N: DWORD, LPX: DWORD, lpy: DWORD; X + = yMoV EDI, LPXMoV ESI, lpyXOR ECx, ECx; carryMoV eax, nDec eax; n-1 subscript@@:MoV edX, [ESI + eax * 4]Add edX, ECxAdd edX, [EDI + eax *

Total Pages: 15 1 .... 5 6 7 8 9 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.