The Radare2 Book Persian Translation Revised Radare1 Book to Fit with R2
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Radare2 Book
Table of Contents introduction 1.1 Introduction 1.2 History 1.2.1 Overview 1.2.2 Getting radare2 1.2.3 Compilation and Portability 1.2.4 Compilation on Windows 1.2.5 Command-line Flags 1.2.6 Basic Usage 1.2.7 Command Format 1.2.8 Expressions 1.2.9 Rax2 1.2.10 Basic Debugger Session 1.2.11 Contributing to radare2 1.2.12 Configuration 1.3 Colors 1.3.1 Common Configuration Variables 1.3.2 Basic Commands 1.4 Seeking 1.4.1 Block Size 1.4.2 Sections 1.4.3 Mapping Files 1.4.4 Print Modes 1.4.5 Flags 1.4.6 Write 1.4.7 Zoom 1.4.8 Yank/Paste 1.4.9 Comparing Bytes 1.4.10 Visual mode 1.5 Visual Disassembly 1.5.1 2 Searching bytes 1.6 Basic Searches 1.6.1 Configurating the Search 1.6.2 Pattern Search 1.6.3 Automation 1.6.4 Backward Search 1.6.5 Search in Assembly 1.6.6 Searching for AES Keys 1.6.7 Disassembling 1.7 Adding Metadata 1.7.1 ESIL 1.7.2 Scripting 1.8 Loops 1.8.1 Macros 1.8.2 R2pipe 1.8.3 Rabin2 1.9 File Identification 1.9.1 Entrypoint 1.9.2 Imports 1.9.3 Symbols (exports) 1.9.4 Libraries 1.9.5 Strings 1.9.6 Program Sections 1.9.7 Radiff2 1.10 Binary Diffing 1.10.1 Rasm2 1.11 Assemble 1.11.1 Disassemble 1.11.2 Ragg2 1.12 Analysis 1.13 Code Analysis 1.13.1 Rahash2 1.14 Rahash Tool 1.14.1 Debugger 1.15 3 Getting Started 1.15.1 Registers 1.15.2 Remote Access Capabilities 1.16 Remoting Capabilities 1.16.1 Plugins 1.17 Plugins 1.17.1 Crackmes 1.18 IOLI 1.18.1 IOLI 0x00 1.18.1.1 IOLI 0x01 1.18.1.2 Avatao 1.18.2 R3v3rs3 4 1.18.2.1 .intro 1.18.2.1.1 .radare2 1.18.2.1.2 .first_steps 1.18.2.1.3 .main 1.18.2.1.4 .vmloop 1.18.2.1.5 .instructionset 1.18.2.1.6 -
Software Studies: a Lexicon, Edited by Matthew Fuller, 2008
fuller_jkt.qxd 4/11/08 7:13 AM Page 1 ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• S •••••••••••••••••••••••••••••••••••••new media/cultural studies ••••software studies •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• O ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• F software studies\ a lexicon ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• T edited by matthew fuller Matthew Fuller is David Gee Reader in ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• This collection of short expository, critical, Digital Media at the Centre for Cultural ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• W and speculative texts offers a field guide Studies, Goldsmiths College, University of to the cultural, political, social, and aes- London. He is the author of Media ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• thetic impact of software. Computing and Ecologies: Materialist Energies in Art and A digital media are essential to the way we Technoculture (MIT Press, 2005) and ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• work and live, and much has been said Behind the Blip: Essays on the Culture of ••••••••••••••••••••••••••••••••••••• -
Radare2 Book
Radare2 Book Table of Contents 1. introduction 2. Introduction i. History ii. Overview iii. Getting radare2 iv. Compilation and Portability v. Compilation on Windows vi. Command-line Flags vii. Basic Usage viii. Command Format ix. Expressions x. Rax2 xi. Basic Debugger Session xii. Contributing to radare2 3. Configuration i. Colors ii. Common Configuration Variables 4. Basic Commands i. Seeking ii. Block Size iii. Sections iv. Mapping Files v. Print Modes vi. Flags vii. Write viii. Zoom ix. Yank/Paste x. Comparing Bytes 5. Visual mode i. Visual Cursor ii. Visual Inserts iii. Visual XREFS iv. Visual Configuration Editor 6. Searching bytes i. Basic Searches ii. Configurating the Search iii. Pattern Search iv. Automatization v. Backward Search vi. Search in Assembly vii. Searching for AES Keys 7. Disassembling 2 Radare2 Book i. Adding Metadata ii. ESIL 8. Rabin2 i. File Identification ii. Entrypoint iii. Imports iv. Symbols (exports) v. Libraries vi. Strings vii. Program Sections 9. Radiff2 i. Binary Diffing 10. Rasm2 i. Assemble ii. Disassemble 11. Analysis i. Code Analysis 12. Rahash2 i. Rahash Tool 13. Debugger i. Registers 14. Remote Access Capabilities i. Remoting Capabilities 15. Plugins i. Plugins 16. Crackmes i. IOLI i. IOLI 0x00 ii. IOLI 0x01 17. Reference Card 3 Radare2 Book R2 "Book" Welcome to the Radare2 Book Webpage: https://www.gitbook.com/book/radare/radare2book/details Online: http://radare.gitbooks.io/radare2book/content/ PDF: https://www.gitbook.com/download/pdf/book/radare/radare2book Epub: https://www.gitbook.com/download/epub/book/radare/radare2book Mobi: https://www.gitbook.com/download/mobi/book/radare/radare2book introduction 4 Radare2 Book Introduction This book aims to cover most usage aspects of radare2. -
Weird Languages (1) for Software Studies Michael Mateas, [email protected]
Weird Languages (1) For Software Studies Michael Mateas, [email protected] Programming languages are often seen as given, an immutable logic within which everyday coding practice takes place. Viewed in this light, a programming language becomes a tool to be mastered, a means to an end. The practice of writing obfuscated code (see Montfort, this volume) exploits the syntactic and semantic play of a language to create code that, often humorously, comments on the constructs provided by a specific language. But the constructs and logics of languages are themselves contingent, abstractions pulled into being out of the space of computational possibility, and enforced and maintained by nothing more than programs, specifically the interpreters and compilers that implement the language. In the field of weird languages, also known as esoteric languages (2), programmers explore and exploit the play that is possible in programming language design. Weird programming languages are not designed for any real-world application or normal educational use; rather, they are intended to test the boundaries of programming language design itself. A quality they share with obfuscated code is that they often ironically comment on features of existing, traditional languages. There are literally dozens, if not hundreds of weird languages, commenting on many different aspects of language design, programming history and programming culture. A representative selection is considered here, with an eye towards understanding what these languages have to tell us about programming aesthetics. Languages are considered in terms of four dimensions of analysis: 1) parody, spoof, or explicit commentary on language features, 2) a tendency to reduce the number of operations and strive toward computational minimalism, 3) the use of structured play to explicitly encourage and support double-coding, and 4) the goal of creating a puzzle, and of making programming difficult. -
Malbolge from Wikipedia, the Free Encyclopedia
Malbolge From Wikipedia, the free encyclopedia Malbolge is a public domain esoteric programming language invented by Ben Olmstead in 1998, named after the eighth circle of hell in Dante's Inferno, the Malebolge. Malbolge Paradigm Esoteric, Imperative, Malbolge was specifically designed to be almost impossible to use, via a counter-intuitive 'crazy operation', base-three Scalar, Value-level arithmetic, and self-altering code.[1] It builds on the difficulty of earlier, challenging esoteric languages (such as Brainfuck and Befunge), but takes this aspect to the extreme, playing on the entangled histories of computer science and encryption. Despite Designed by Ben Olmstead this design, it is possible (though very difficult) to write useful Malbolge programs. First appeared 1998 Typing Untyped discipline Contents Filename .mal, .mb extensions Influenced by 1 Programming in Malbolge 2 Example Program Brainfuck, INTERCAL (Tri-INTERCAL), Befunge 2.1 Hello, World! Influenced 2.2 CAT Program Dis 3 Design 3.1 Registers 3.2 Pointer notation 3.3 Memory 3.4 Instructions 3.5 Crazy operation 3.6 Encryption 4 Variants 5 Popular culture 6 See also 7 References 8 External links Programming in Malbolge Malbolge was so difficult to understand when it arrived that it took two years for the first Malbolge program to appear. Indeed, the author himself has never written a single Malbolge program.[1] The first program was not written by a human being: it was generated by a beam search algorithm designed by Andrew Cooke and implemented in Lisp.[2] Later, Lou Scheffer posted a cryptanalysis of Malbolge and provided a program to copy its input to its output.[3] He also saved the original interpreter and specification after the original site stopped functioning, and offered a general strategy of writing programs in Malbolge as well as some thoughts on its Turing-completeness.[4] Olmstead believed Malbolge to be a linear bounded automaton. -
Esoteric Programming Languages
Esoteric Programming Languages An introduction to Brainfuck, INTERCAL, Befunge, Malbolge, and Shakespeare Sebastian Morr Braunschweig University of Technology [email protected] ABSTRACT requires its programs to look like Shakespearean plays, mak- There is a class of programming languages that are not actu- ing it a themed language. It is not obvious at all that the ally designed to be used for programming. These so-called resulting texts are, in fact, meaningful programs. For each “esoteric” programming languages have other purposes: To language, we are going describe its origins, history, and to- entertain, to be beautiful, or to make a point. This paper day’s significance. We will explain how the language works, describes and contrasts five influential, stereotypical, and give a meaningful example and mention some popular imple- widely different esoteric programming languages: The mini- mentations and variants. All five languages are imperative languages. While there mal Brainfuck, the weird Intercal, the multi-dimensional Befunge, the hard Malbolge, and the poetic Shakespeare. are esoteric languages which follow declarative programming paradigms, most of them are quite new and much less popu- lar. It is also interesting to note that esoteric programming 1. INTRODUCTION languages hardly ever seem to get out of fashion, because While programming languages are usually designed to be of their often unique, weird features. Whereas “real” multi- used productively and to be helpful in real-world applications, purpose languages are sometimes replaced by more modern esoteric programming languages have other goals: They can ones that add new features or make programming easier represent proof-of-concepts, demonstrating how minimal a in some way, esoteric languages are not under this kind of language syntax can get, while still maintaining universality. -
Introduction to Esoteric Language Malbolge Masahiko Sakai (Nagoya University) 99 Bottles of Beer(1/3) 99 Bottles of Beer(2/3) 99
99 bottles of beer(2/3) 99 bottles of beer(1/3) • Top list (2008): ours in Malbolge is No.1 ! • http://www.99-bottles-of-beer.net/ • Collection of programs that output the song Introduction to 99 bottles of beer on the wall, 99 bottles of beer. Esoteric Language Malbolge Take on down and pass it around, 98 bottles of beer on the wall. ... 2 bottles of beer on the wall, 2 bottles of beer. Masahiko Sakai (Nagoya University) Take on down and pass it around, 1 bottle of beer on the wall. 1 bottle of beer on the wall, 1 bottle of beer. Take on down and pass it around, no more bottles of beer on the 10 Dec 2010, College of Technology, VNU wall. No more bottles of beer on the wall, no more bottles of beer. Go to the store and buy some more, 99 bottles of beer on the wall. • Programs in more than 1200 different lan- guages 1 2 3 99 bottles of beer(3/3) Esoteric Programming Languages Malbolge • Comments for Malbolge • Language designed to be HARD to read and • A programming language come from HELL write - 10 trits machine defined by its interpreter - INTERCAL [Woods, Lyon 1972] - Each operation is modified after execution - BrainF∗ ∗ ∗ [M¨uller 1993] - Only one trit-wise operation is poor - Befunge [Pressey 1997] A,[D] := crz(A,[D]) - Malbolge [Olmstead 1998] [D]\ A 0 1 2 0 1 0 0 • Proposed as jokes 1 1 0 2 • References 2 2 2 1 http://members.tripod.com/rkusnery/weird.html - Hard to load data, because non-operations http://www.99-bottles-of-beer.net/toplist_esoteric.html are not loadable. -
Weird Languages1 Michael Mateas Programming Languages Are Often Seen As a Given an Immutable Logic Within Which Everyday Coding Practice Takes Place
Weird Languages1 Michael Mateas Programming languages are often seen as a given an immutable logic within which everyday coding practice takes place. Viewed in this light, a program- ming language becomes a tool to be mastered, a means to an end. The practice of writing obfuscated code (see Montfort in this volume) exploits the syntactic and semantic play of a language to create code that, often humorously, com- ments on the constructs provided by a specifi c language. But the constructs and logics of languages are themselves contingent abstractions pulled into be- ing out of the space of computational possibility, and enforced and maintained by nothing more than programs, specifi cally the interpreters and compilers that implement the languages. In the fi eld of “weird” or “esoteric” languages,2 programmers explore and exploit the play that is possible in programming language design. Weird pro- gramming languages are not designed for any real-world application or normal educational use; rather, they are intended to test the boundaries of program- ming language design itself. A quality they share with obfuscated code is that they often ironically comment on features of existing, traditional languages. There are literally dozens, if not hundreds of weird languages, which com- ment on many different aspects of language design, programming history, and programming culture. A representative selection is considered here, with an eye toward understanding what these languages have to tell us about program- ming aesthetics. Languages are considered in terms of four dimensions of analysis: (1) parody, spoof, or explicit commentary on language features, (2) a tendency to reduce the number of operations and strive toward computational minimalism, (3) the use of structured play to explicitly encourage and support double- coding, and (4) the goal of creating a puzzle, and of making programming diffi cult. -
A Trip Into Estoteric Languages, Turing Machines, Cellular Automata and the Nature of Computation
From Brainfuck to Domino Computers A trip into Estoteric Languages, Turing Machines, Cellular Automata and the Nature of Computation Nicolas Seriot October 27th, 2017 1. Esoteric Languages 2. Turing Machines 3. 2D Cellular Automata 4. 1D Cellular Automata 5. Computers Everywhere Brainfuck +++>++>>>+[>>,[>+++++<[[->]<<]<[>]>]>-[<<+++++>>-[<<---->>-[->]<]] <[<-<[<]+<+[>]<<+>->>>]<]<[<]>[-[>++++++<-]>[<+>-]+<<<+++>+> [- [<<+>->- [<<[-]>>- [<<++>+>- [<<-->->>+++<- [<<+>+>>--<- [<<->->- [<<++++>+>>+<- [>-<- [<<->->- [<<->>- [<<+++>>>-<- [<<---->>>++<- [<<++>>>+<- [>[-]<- [<<->>>+++<- [<<->>>--<- [<<++++>+>>+<- [<<[-]>->>++<- [<<+++++>+>>--<- [<->>++< [<<->>- ]]]]]]]]]]]]]]]]]]]]]]<[->>[<<+>>-]<<<[>>>+<<<-]<[>>>+<<<-]]>>] >[-[---[-<]]>]>[+++[<+++++>--]>]+<++[[>+++++<-]<]>>[-.>] Brainfuck Syntax > Move the pointer to the right < Move the pointer to the left + Increment the memory cell under the pointer - Decrement the memory cell under the pointer . Output the character signified by the cell at the pointer , Input a character and store it in the cell at the pointer [ Jump past the matching ] if the cell under the pointer is 0 ] Jump back to the matching [ if the cell under the pointer is nonzero BF Addition [->+<] # [0, 0, 0, ...] ++> # [2, 0, 0, ...] +++< # [2, 3, 0, ...] [->+<] # [0, 5, 0, ...] ------------------------------------------------------------------------------------ STEP: 6 PROG: ++++++[>++++++<-]>. ^ 6 DATA: 06 00 00 00 00 00 00 00 00 00 00 ^^ 0 ------------------------------------------------------------------------------------ -
PHP Or Other Scripting Languages - and Scale Them to Compete with Established "Store Bought" Enterprise Web Technologies
Building Scalable Web Sites By Cal Henderson ............................................... Publisher: O'Reilly Pub Date: May 2006 Print ISBN-10: 0-596-10235-6 Print ISBN-13: 978-0-59-610235-7 Pages: 348 Table of Contents | Index Slow websites infuriate users. Lots of people can visit your web site or use your web application - but you have to be prepared for those visitors, or they won't come back. Your sites need to be built to withstand the problems success creates. Building Scalable Web Sites looks at a variety of techniques for creating sites that can keep users cheerful even when there are thousands or millions of them. Flickr.com developer, Cal Henderson, explains how to build sites so that large numbers of visitors can enjoy them. Henderson examines techniques that go beyond sheer speed, exploring how to coordinate developers, support international users, and integrate with other services from email to SOAP to RSS to the APIs exposed by many Ajax-based web applications. This book uncovers the secrets that you need to know for back-end scaling, architecture and failover so your websites can handle countless requests. You'll learn how to take the "poor man's web technologies" - Linux, Apache, MySQL and PHP or other scripting languages - and scale them to compete with established "store bought" enterprise web technologies. Toward the end of the book, you'll discover techniques for keeping web applications running with event monitoring and long- term statistical tracking for capacity planning. If you're about to build your first dynamic website, then Building Scalable Web Sites isn't for you. -
A Box, Darkly: Obfuscation, Weird Languages, and Code Aesthetics
A Box, Darkly: Obfuscation, Weird Languages, and Code Aesthetics Michael Mateas Nick Montfort Georgia Institute of Technology University of Pennsylvania College of Computing Department of Computer and Information Science School of Literature, Communication and Culture [email protected] [email protected] ABSTRACT The standard idea of code aesthetics, when such an idea manifests 2. READING CODE itself at all, allows for programmers to have elegance and clarity Version 2.1 of the online lexical reference system WordNet gives as their standards. This paper explores programming practices in 11 senses for “read,” including “look at, interpret, and say out which other values are at work, showing that the aesthetics of loud something that is written or printed” and “interpret the code must be enlarged to accommodate them. The two practices significance of, as of palms, tea leaves, intestines, the sky, etc.; considered are obfuscated programming and the creation of also of human behavior.” [14] This discussion is about a fairly “weird languages” for coding. Connections between these two literal application of the most common sense, “interpret practices, and between these and other mechanical and literary something that is written or printed,” although of course code that aesthetic traditions, are discussed. appears on a screen (rather than being written or printed out) can also be read. 1. INTRODUCTION The understanding of behavior is certainly involved in reading Programmers write code in order to cause the computer to code in the primary sense of “read,” however. It is essential to any function in desired ways. But modern computer programs are ordinary human reading of a computer program to develop an written in a form, usually textual, that is also meant to be understanding of how the computer will behave, and what it will manipulable and understandable by human beings. -
Serial Programming
Serial Programming Wikibooks.org March 18, 2013 On the 28th of April 2012 the contents of the English as well as German Wikibooks and Wikipedia projects were licensed under Creative Commons Attribution-ShareAlike 3.0 Unported license. An URI to this license is given in the list of figures on page 141. If this document is a derived work from the contents of one of these projects and the content was still licensed by the project under this license at the time of derivation this document has to be licensed under the same, a similar or a compatible license, as stated in section 4b of the license. The list of contributors is included in chapter Contributors on page 139. The licenses GPL, LGPL and GFDL are included in chapter Licenses on page 145, since this book and/or parts of it may or may not be licensed under one or more of these licenses, and thus require inclusion of these licenses. The licenses of the figures are given in the list of figures on page 141. This PDF was generated by the LATEX typesetting software. The LATEX source code is included as an attachment (source.7z.txt) in this PDF file. To extract the source from the PDF file, we recommend the use of http://www.pdflabs.com/tools/pdftk-the-pdf-toolkit/ utility or clicking the paper clip attachment symbol on the lower left of your PDF Viewer, selecting Save Attachment. After extracting it from the PDF file you have to rename it to source.7z. To uncompress the resulting archive we recommend the use of http://www.7-zip.org/.