Disco: Combining Disassemblers for Improved Performance

Total Page:16

File Type:pdf, Size:1020Kb

Disco: Combining Disassemblers for Improved Performance DisCo: Combining Disassemblers for Improved Performance Sri Shaila G Ahmad Darki Michalis Faloutsos University of California, Riverside University of California, Riverside University of California, Riverside USA USA USA [email protected] [email protected] [email protected] Nael Abu-Ghazaleh Manu Sridharan University of California, Riverside University of California, Riverside USA USA [email protected] [email protected] ABSTRACT KEYWORDS Malware infects thousands of systems globally each day causing Ensemble, Disassembly Tools, ARM and MIPS architecture, Ghidra millions of dollars in damages. Which disassembler should a mal- Bug Discovery, Improving Disassembly ware analyst choose in order to get the most accurate disassembly ACM Reference Format: and be able to detect, analyze and defuse malware quickly? There Sri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael Abu-Ghazaleh, and Manu is no clear answer to this question: (a) the performance of disas- Sridharan. 2021. DisCo: Combining Disassemblers for Improved Perfor- semblers varies across configurations, and (b) most prior work on mance . In ACM Publications RAID ’21. ACM, New York, NY, USA, 15 pages. disassemblers focuses on benign software and the x86 CPU archi- https://doi.org/10.1145/nnnnnnn.nnnnnnn tecture. In this work, we take a different approach and ask: why 1 INTRODUCTION not use all the disassemblers instead of picking one? We present DisCo, a novel and effective approach to harness the collective ca- pability of a group of disassemblers combining their output into an ensemble consensus. We develop and evaluate our approach using 1760 IoT malware binaries compiled with different compilers and compiler options for the ARM and MIPS architectures. First, we show that DisCo can combine the collective wisdom of disassem- blers effectively. For example, our approach outperforms the best contributing disassembler by as much as 17.8% in the F1 score for Figure 1: DisCo effectively combines disassemblers for su- function start identification for MIPS binaries compiled using GCC perior performance: The gain in the performance over the with O3 option. Second, the collective wisdom of the disassemblers best input can be as high as +17.8% with a combined perfor- can be brought back to improve each disassembler. As a proof of mance 99.8% in F1 score combining five disassemblers. The concept, we show that byte-level signatures identified by DisCo can results shown are for malware binaries compiled with GCC improve the performance of Ghidra by as much as 13.6% in terms for MIPS with the O3 compilation level. The approach can of the F1 score. Third, we quantify the effect of the architecture, work with different sets of disassemblers. We show the im- the compiler, and the compiler options on the performance of dis- provement using only freely available disassemblers (+12.4% assemblers. Finally, the systematic evaluation within our approach with a total of 94.4%). led to a bug discovery in Ghidra v9.1, which was acknowledged by the Ghidra team. Binary disassemblers are essential front-line tools in malware defense: timely and efficient reverse engineering of the malware CCS CONCEPTS binary is critical. An incident in 2017 highlights the importance • Software and its engineering ! Software organization and of this issue: two ransomwares, WannaCry and Petya infected properties; • Computing methodologies ! Ensemble methods; over 230 000 Windows PCs across 150 countries by exploiting a • Security and privacy ! Software and application security. vulnerability in Microsoft’s implementation of the Server Message Block protocol in a span of one day. These attacks cost over $4 billion dollars in damages [11, 32]. The rapid spread of these malwares had malware analysts racing against time to understand their mode of Permission to make digital or hard copies of part or all of this work for personal or propagation and operation in order to contain them. classroom use is granted without fee provided that copies are not made or distributed Which disassembler should a malware analyst choose for a for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. rapidly-spreading malware binary to get the most accurate results? For all other uses, contact the owner/author(s). This is the question that motivates our work. Here we focus on RAID ’21, October 6-8, 2021, Donostia / San Sebastian, Spain malware that targets MIPS and ARM architectures, given that such © 2021 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-3916-2. malware has received significantly less attention. In addition, these https://doi.org/10.1145/nnnnnnn.nnnnnnn architectures are widely used in IoT devices, which are increasingly 1 RAID ’21, October 6-8, 2021, Donostia / San Sebastian, Spain Sri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael Abu-Ghazaleh, and Manu Sridharan becoming targets of choice for malware [4, 56]. Currently, there is Specifically, we consider the following configuration options: (a) no clear answer to the above question, for the ARM and, and even two architectures, MIPS and ARM, (b) two different compilers, more so, the MIPS architecture. We elaborate on two contributing GCC and Clang, and (c) five compiler optimization levels. Note factors to this problem. that we focus on the function start identification metric, which First, there is a plethora of disassemblers both free and commer- is a key disassembly metric [25]. To quantify the variability, in cial, but research so far has not determined a clear and consistent addition to the average performance, we consider the 5-percentile winner. The performance of a disassembler can vary based on the of the worst case performance (5PWC), which we define later. type of the malware binary, which can be created by using various: Finally, we introduce the Relative Performance Improvement (a) compilers, (b) compiler optimization flags, and (c) target CPU (RPI) metric as the difference between the performance of DisCo for architectures. These variations can lead to significant differences a group of disassemblers and that of the best performing individual in the assembly code found in the resultant binary [12, 18]. Note disassembler in the group. that determining the compilation parameters for a given stripped In summary, the contribution of our work can be summarized in binary is a challenging task. Despite some recent studies [2, 25], the following key observations: the effect of these variations on the accuracy of disassembly are a. DisCo is effective in combining disassemblers. DisCo can not well understood, especially for the MIPS architecture. combine the capabilities of different groups of disassemblers to Second, the average performance of a disassembler may not be achieve relative performance improvement, RPI. In table 1, we show sufficient to inform the correct answer: we need to assess its worst that DisCo achieves an RPI of up to 17.8% across various configu- case performance as well. This reliability aspect of a disassembler is ration options. Furthermore, there is an even larger improvement lost when we only report average performance, and even standard of up to 27.5% in the worst case 5PWC metric. We showcase the deviation does not fully capture it. The ideal disassembler should effectiveness of our approach visually in figure 1. Considering only offer accurate disassembly consistently for each binary. Going back our four non-commercial disassemblers, from table 1, we see that to our motivating example, the binary at hand may belong to the DisCo(Free) has an RPI of up to 12.4% for MIPS. minority group of binaries for which the overall-best disassem- b. DisCo can be used to improve other disassemblers. We bler performs poorly. This poor performance at "crunch-time" can show that the collective power of the disassemblers, which DisCo translate into massive financial and societal damage. synthesizes, can be brought back to improve each disassembler. There is limited prior work for the our problem here as it fo- As a proof of concept, we create, Ghidra+, an improved version of cuses on: (a) malware, and (b) the MIPS and ARM architectures. In Ghidra, which can achieve up to 13.6% better F1 score compared to contrast, most previous work seems to focus on benign binaries Ghidra. Our systematic evaluation of disassemblers also reveals a and the x86, and most recently, the ARM architecture. We highlight bug in Ghidra v9.1, which was acknowledged by the Ghidra team. the two most relevant studies. The most recent work [25] evaluates c. Configuration options affect disassembly performance several disassemblers using only benign binaries and for the ARM significantly including their relative ranking. We find that the architecture only. Another work [2] evaluates disassemblers for the ranking of the best performing disassemblers varies for different x86-64 architecture. Both studies [2, 25] endorse IDA Pro, a popular configurations. For example, Angr is the best among thegroup commercial disassembler, in terms of overall performance and find for MIPS with O3 for both GCC and Clang, but it performs the that accurate function start identification remains a challenge. We lowest for the ARM architecture (see table 2). Furthermore, we revisit previous work in section 6. find that the compiler optimization levels impact the performance In this work, we take a different approach and pose the question: significantly: most disassemblers do fairly well with O0 andO1, Why don’t we benefit from the wisdom of all the disassemblers in- but do worse with O3 option. These observations and our results stead of picking one? To this end, we present DisCo (Disassembler in general strongly argue in favor of the promise of a combined Combination), a systematic approach to harness the collective ca- solution. pabilities of a group of disassemblers to obtain superior results. Open-sourcing and data sharing.
Recommended publications
  • Fill Your Boots: Enhanced Embedded Bootloader Exploits Via Fault Injection and Binary Analysis
    IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925, Vol. 2021, No. 1, pp. 56–81. DOI:10.46586/tches.v2021.i1.56-81 Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis Jan Van den Herrewegen1, David Oswald1, Flavio D. Garcia1 and Qais Temeiza2 1 School of Computer Science, University of Birmingham, UK, {jxv572,d.f.oswald,f.garcia}@cs.bham.ac.uk 2 Independent Researcher, [email protected] Abstract. The bootloader of an embedded microcontroller is responsible for guarding the device’s internal (flash) memory, enforcing read/write protection mechanisms. Fault injection techniques such as voltage or clock glitching have been proven successful in bypassing such protection for specific microcontrollers, but this often requires expensive equipment and/or exhaustive search of the fault parameters. When multiple glitches are required (e.g., when countermeasures are in place) this search becomes of exponential complexity and thus infeasible. Another challenge which makes embedded bootloaders notoriously hard to analyse is their lack of debugging capabilities. This paper proposes a grey-box approach that leverages binary analysis and advanced software exploitation techniques combined with voltage glitching to develop a powerful attack methodology against embedded bootloaders. We showcase our techniques with three real-world microcontrollers as case studies: 1) we combine static and on-chip dynamic analysis to enable a Return-Oriented Programming exploit on the bootloader of the NXP LPC microcontrollers; 2) we leverage on-chip dynamic analysis on the bootloader of the popular STM8 microcontrollers to constrain the glitch parameter search, achieving the first fully-documented multi-glitch attack on a real-world target; 3) we apply symbolic execution to precisely aim voltage glitches at target instructions based on the execution path in the bootloader of the Renesas 78K0 automotive microcontroller.
    [Show full text]
  • Radare2 Book
    Table of Contents introduction 1.1 Introduction 1.2 History 1.2.1 Overview 1.2.2 Getting radare2 1.2.3 Compilation and Portability 1.2.4 Compilation on Windows 1.2.5 Command-line Flags 1.2.6 Basic Usage 1.2.7 Command Format 1.2.8 Expressions 1.2.9 Rax2 1.2.10 Basic Debugger Session 1.2.11 Contributing to radare2 1.2.12 Configuration 1.3 Colors 1.3.1 Common Configuration Variables 1.3.2 Basic Commands 1.4 Seeking 1.4.1 Block Size 1.4.2 Sections 1.4.3 Mapping Files 1.4.4 Print Modes 1.4.5 Flags 1.4.6 Write 1.4.7 Zoom 1.4.8 Yank/Paste 1.4.9 Comparing Bytes 1.4.10 Visual mode 1.5 Visual Disassembly 1.5.1 2 Searching bytes 1.6 Basic Searches 1.6.1 Configurating the Search 1.6.2 Pattern Search 1.6.3 Automation 1.6.4 Backward Search 1.6.5 Search in Assembly 1.6.6 Searching for AES Keys 1.6.7 Disassembling 1.7 Adding Metadata 1.7.1 ESIL 1.7.2 Scripting 1.8 Loops 1.8.1 Macros 1.8.2 R2pipe 1.8.3 Rabin2 1.9 File Identification 1.9.1 Entrypoint 1.9.2 Imports 1.9.3 Symbols (exports) 1.9.4 Libraries 1.9.5 Strings 1.9.6 Program Sections 1.9.7 Radiff2 1.10 Binary Diffing 1.10.1 Rasm2 1.11 Assemble 1.11.1 Disassemble 1.11.2 Ragg2 1.12 Analysis 1.13 Code Analysis 1.13.1 Rahash2 1.14 Rahash Tool 1.14.1 Debugger 1.15 3 Getting Started 1.15.1 Registers 1.15.2 Remote Access Capabilities 1.16 Remoting Capabilities 1.16.1 Plugins 1.17 Plugins 1.17.1 Crackmes 1.18 IOLI 1.18.1 IOLI 0x00 1.18.1.1 IOLI 0x01 1.18.1.2 Avatao 1.18.2 R3v3rs3 4 1.18.2.1 .intro 1.18.2.1.1 .radare2 1.18.2.1.2 .first_steps 1.18.2.1.3 .main 1.18.2.1.4 .vmloop 1.18.2.1.5 .instructionset 1.18.2.1.6
    [Show full text]
  • Using Static and Dynamic Binary Analysis with Ret-Sync
    Bière sécu Bordeaux 1st event Date 26/02/2020 Place Zytho By Jiss – Daniel – Tiana Combining static and dynamic binary analysis ret-sync Date 26/02/2020 Place Zytho By Jean-Christophe Delaunay Context 2 approaches in reverse-engineering (RE) : static (disass/decompile) IDA, Ghidra, etc. dynamic (debug) x64dbg, WinDbg, LLDB, etc. Possible to combine both worlds in the same tool… … but often painful to use (eg. IDA dbg) Annoying to switch between multiple tools 3 / 29 Context Classical example: I’m debugging using WinDbg, I spot a routine or structure which seems interesting I’d like to know if I’ve already documented it within IDA … I need to compute the offset from the load address of my module (ASLR/relloc) … add it to the preferred load address of my module in my idb Conclusion: straightforward but painful if I have to do that every 2 minutes … even more painful provided that I use x64dbg for usermode and WinDbg for kernelmode 4 / 29 Solutions Code a new tool which would combine both worlds… 5 / 29 Solutions Code a new tool which would combine both worlds… 6 / 29 Solutions Code a new tool which would combine both worlds… Set-up a glue which would create an interface between the disass and the debugger(s)… … ret-sync by Alexandre Gazet https://github.com/bootleg/ret-sync 7 / 29 ret-sync: support Static: IDA Ghidra Dynamic: WinDbg(-preview) GDB LLDB OllyDbg 1.10 OllyDbg v2 x64dbg 8 / 29 ret-sync: features Permits to “follow” the program workflow in IDA/Ghidra view “step” in the dbg “step” in the disass static view Dynamic switching between multiple idbs trace within toto.exe trace within toto.idb toto.exe issues a call in fistouille.dll switch to fistouille.idb Automagical rebase Sending commands to the dbg (bp, hbp, lbl, etc.) Custom commands1 All features are available both in disass AND decompiled views etc.
    [Show full text]
  • Android Malware and Analysis
    ANDROID MALWARE AND ANALYSIS Ken Dunham • Shane Hartman Jose Andre Morales Manu Quintans • Tim Strazzere Click here to buy Android Malware and Analysis CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2015 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper Version Date: 20140918 International Standard Book Number-13: 978-1-4822-5219-4 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc.
    [Show full text]
  • Analyzing and Detecting Emerging Internet of Things Malware: a Graph-Based Approach
    This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/JIOT.2019.2925929 1 Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach Hisham Alasmaryzy, Aminollah Khormaliy, Afsah Anwary, Jeman Parky, Jinchun Choi{y, Ahmed Abusnainay, Amro Awady, DaeHun Nyang{, and Aziz Mohaiseny yUniversity of Central Florida zKing Khalid University {Inha University Abstract—The steady growth in the number of deployed Linux-like capabilities. In particular, Busybox is widely used Internet of Things (IoT) devices has been paralleled with an equal to achieve the desired functionality; based on a light-weighted growth in the number of malicious software (malware) targeting structure, it supports utilities needed for IoT devices. those devices. In this work, we build a detection mechanism of IoT malware utilizing Control Flow Graphs (CFGs). To motivate On the other hand, and due to common structures, the for our detection mechanism, we contrast the underlying char- Linux capabilities of the IoT systems inherit and extend the acteristics of IoT malware to other types of malware—Android potential threats to the Linux system. Executable and Linkable malware, which are also Linux-based—across multiple features. Format (ELF), a standard format for executable and object The preliminary analyses reveal that the Android malware have code, is sometimes exploited as an object of malware. The high density, strong closeness and betweenness, and a larger number of nodes.
    [Show full text]
  • INFILTRATE Ghidra
    Three Heads Are Better Than One: Mastering NSA's Ghidra Reverse Engineering Tool Alexei Bulazel Jeremy Blackthorne @0xAlexei @0xJeremy github.com/0xAlexei/INFILTRATE2019 Disclaimer This material is based on the publicly released Ghidra, there is no classified information in this presentation Alexei Bulazel @0xAlexei ● Senior Security Researcher at River Loop Security ● Research presentations and publications: ○ Presentations at REcon (MTL & BRX), SummerCon, DEFCON, Black Hat, etc. ○ Academic publications at USENIX WOOT and ROOTS ○ Cyber policy in Lawfare, etc. ● Collaborated with Jeremy on research at RPI, MIT Lincoln Laboratory, and Boston Cybernetics Institute ● Proud RPISEC alumnus Jeremy Blackthorne @0xJeremy ● Instructor at the Boston Cybernetics Institute ● PhD candidate at RPI focused on environmental keying ● Former researcher at MIT Lincoln Laboratory ● United States Marine Corps 2002 - 2006 ● RPISEC alumnus Outline 1. Intro 2. Interactive Exercises a. Manual Static Analysis b. Scripting Ghidra 3. P-Code & SLEIGH 4. Discussion 5. Conclusion Participating 1. Install OpenJDK 11, add its bin directory to your PATH ● jdk.java.net/11 2. Download Ghidra ● ghidra-sre.org ● github.com/NationalSecurityAgency/ghidra/releases 3. Download our demo scripts and binaries ● github.com/0xAlexei/INFILTRATE2019 Ghidra ● Java-based interactive reverse engineering tool developed by US National Security Agency - similar in functionality to IDA Pro, Binary Ninja, etc… ○ Static analysis only currently, debugger support promised to be coming soon ○ Runs on Mac, Linux, and Windows ● All credit for creating Ghidra goes to the developers at NSA ● Released open source at RSA in March 2019 ○ 1.2M+ lines of code ● NSA has not discussed the history of the tool, but comments in source files go as far back as February 1999 Outline 1.
    [Show full text]
  • Android Reverse Engineering: Understanding Third-Party Applications
    Android reverse engineering: understanding third-party applications Vicente Aguilera Díaz OWASP Spain Chapter Leader Co-founder of Internet Security Auditors [email protected] Twitter: @vaguileradiaz www.vicenteaguileradiaz.com OWASP EU Tour 2013 Copyright © The OWASP Foundation June 5, 2013. Bucharest (Romania) Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation http://www.owasp.org Who I am? VICENTE AGUILERA DÍAZ Co-founder of Internet Security Auditors OWASP Spain Chapter Leader More info: www.vicenteaguileradiaz.com OWASP 2 Agenda Reverse engineering: definition and objectives Application analysis workflow Malware identification in Android apps OWASP 3 Reverse engineering: definition and objectives Definition Refers to the process of analyzing a system to identify its components and their interrelationships, and create representations of the system in another form or a higher level of abstraction. [1] Objetives The purpose of reverse engineering is not to make changes or to replicate the system under analysis, but to understand how it was built. OWASP 4 Application analysis workflow Original APK Analyze Decompress and Rebuild Dissassemble APK Modify Scope of this presentation Modified APK OWASP 5 Application analysis workflow App Name SaveAPK Astro File Manager Real APK Leecher APK apktool radare2 unzip AndroidManifest.xml /lib apktool.yml /META-INF /assets /res /res resources.arsc AXMLPrinter2.jar Disasm /smali AndroidManifest.xml Human-readable
    [Show full text]
  • Arxiv:1611.10231V1 [Cs.CR] 30 Nov 2016 a INTRODUCTION 1
    00 Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions Parvez Faruki, Malaviya National Institute of Technology Jaipur, India Hossein Fereidooni, University of Padua, Italy Vijay Laxmi, Malaviya National Institute of Technology Jaipur, India Mauro Conti, University of Padua, Italy Manoj Gaur, Malaviya National Institute of Technology Jaipur, India Mobile devices have become ubiquitous due to centralization of private user information, contacts, messages and multiple sensors. Google Android, an open-source mobile Operating System (OS), is currently the mar- ket leader. Android popularity has motivated the malware authors to employ set of cyber attacks leveraging code obfuscation techniques. Obfuscation is an action that modifies an application (app) code, preserving the original semantics and functionality to evade anti-malware. Code obfuscation is a contentious issue. Theoretical code analysis techniques indicate that, attaining a verifiable and secure obfuscation is impos- sible. However, obfuscation tools and techniques are popular both among malware developers (to evade anti-malware) and commercial software developers (protect intellectual rights). We conducted a survey to uncover answers to concrete and relevant questions concerning Android code obfuscation and protection techniques. The purpose of this paper is to review code obfuscation and code protection practices, and evalu- ate efficacy of existing code de-obfuscation tools. In particular, we discuss Android code obfuscation methods, custom app protection techniques, and various de-obfuscation methods. Furthermore, we review and ana- lyze the obfuscation techniques used by malware authors to evade analysis efforts. We believe that, there is a need to investigate efficiency of the defense techniques used for code protection. This survey would be beneficial to the researchers and practitioners, to understand obfuscation and de-obfuscation techniques to propose novel solutions on Android.
    [Show full text]
  • Challenges in Firmware Re-Hosting, Emulation, and Analysis
    Challenges in Firmware Re-Hosting, Emulation, and Analysis CHRISTOPHER WRIGHT, Purdue University WILLIAM A. MOEGLEIN, Sandia National Laboratories SAURABH BAGCHI, Purdue University MILIND KULKARNI, Purdue University ABRAHAM A. CLEMENTS, Sandia National Laboratories System emulation and firmware re-hosting have become popular techniques to answer various security and performance related questions, such as, does a firmware contain security vulnerabilities or meet timing requirements when run on a specific hardware platform. While this motivation for emulation and binary analysis has previously been explored and reported, starting to either work or research in the field is difficult. To this end, we provide a comprehensive guide for the practitioner or system emulation researcher. We layout common challenges faced during firmware re-hosting, explaining successive steps and surveying common tools used to overcome these challenges. We provide classification techniques on five different axes, including emulator methods, system type, fidelity, emulator purpose, and control. These classifications and comparison criteria enable the practitioner to determine the appropriate tool for emulation. We use our classifications to categorize popular works in the field and present 28 common challenges faced when creating, emulating and analyzing a system, from obtaining firmwares to post emulation analysis. CCS Concepts: • Computer systems organization → Embedded and cyber-physical systems; Firmware; Embedded hardware; Embedded software; Real-time systems; • Hardware → Simulation and emulation. Additional Key Words and Phrases: Firmware re-hosting, system emulation, embedded systems, emulation fidelity, emulator classification, binary analysis, reverse engineering, emulation challenges ACM Reference Format: Christopher Wright, William A. Moeglein, Saurabh Bagchi, Milind Kulkarni, and Abraham A. Clements. 2020. Challenges in Firmware Re-Hosting, Emulation, and Analysis.
    [Show full text]
  • Windows Malware Analysis & Static Analysis Blocking CYS5120 - Malware Analysis Bahcesehir University Cyber Security Msc Program
    Code Analysis Analyzing Malicious Windows Programs Static Analysis Blocking Methods 04 - Code Analysis & Windows Malware Analysis & Static Analysis Blocking CYS5120 - Malware Analysis Bahcesehir University Cyber Security Msc Program Dr. Ferhat Ozgur Catak 1 Mehmet Can Doslu 2 [email protected] [email protected] 2017-2018 Fall Dr. Ferhat Ozgur Catak & Mehmet Can Doslu 04 - Code Analysis & Windows Malware Analysis & Static Analysis Blocking Code Analysis Analyzing Malicious Windows Programs Static Analysis Blocking Methods Table of Contents 1 Code Analysis Packers & Unpacking Stack Operations Packer Anatomy Disassembler & Debugger Identifying Packed Programs IDA Pro Automated Unpacking The IDA Pro Interface Manual Unpacking Useful Windows for Analysis Anti-disassembly Lab Jump Instructions with the 2 Analyzing Malicious Windows Same Target Programs A Jump Instruction with a Introduction Constant Condition The Windows API Impossible Disassembly File System Functions The Function Pointer Problem Special Files Return Pointer Abuse The Windows Registry Misusing Structured Exception Networking APIs Handlers Lab Thwarting Stack-Frame 3 Static Analysis Blocking Methods Analysis Dr. Ferhat Ozgur Catak & Mehmet Can Doslu 04 - Code Analysis & Windows Malware Analysis & Static Analysis Blocking Code Analysis Analyzing Malicious Windows Programs Static Analysis Blocking Methods Table of Contents 1 Code Analysis Packers & Unpacking Stack Operations Packer Anatomy Disassembler & Debugger Identifying Packed Programs IDA Pro Automated Unpacking The IDA Pro Interface Manual Unpacking Useful Windows for Analysis Anti-disassembly Lab Jump Instructions with the 2 Analyzing Malicious Windows Same Target Programs A Jump Instruction with a Introduction Constant Condition The Windows API Impossible Disassembly File System Functions The Function Pointer Problem Special Files Return Pointer Abuse The Windows Registry Misusing Structured Exception Networking APIs Handlers Lab Thwarting Stack-Frame 3 Static Analysis Blocking Methods Analysis Dr.
    [Show full text]
  • Ghidra Vs Radare2
    Ghidra Vs Radare2 Radare2 – is a framework built for reverse engineering and analyzing binaries. js File size differs 2462470 vs 2461765 Buffer truncated to 2461765 byte(s) (705 not compared) 86611 So… the WebAssembly is essentially generating JavaScript on-the-fly. With the addition, the latest UFC 257 lineup includes: Conor McGregor vs. Plugin manager for x64dbg. radare2 tools. Я открываю программу в Cutter — GUI для radare2 со встроенным декомпилятором ghidra, имеющим возможность эмуляции, а с недавних пор и отладки. Plugin manager for x64dbg. 7 місяців тому. Watch the UFC 257 "McGregor vs. With radare2 you can analyze, disassemble. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minute long, summary of current network security related events. radare2 was added by Tim_B in Sep 2016 and the latest update was made in Apr 2018. Free and Open Source RE Platform powered by Rizin. Ve srovnání s komerčním IDA je pomalejší a má víc chyb. Even if you know how to disassemble a Brown iron, this will not help. IDA Pro is a programmable, interactive, and multi-processor disassembler combined with a local and remote debugger and augmented by a complete plugin programming environment. 0 has been released!. We are using radare2 together with avr-gdb and simavr to reverse engineer the challenge "Jumpy" which implemets a password checking algorithm В видео речь пойдет про Ida Pro (free) x64dbg (плагины snowmen, x64dbg2ghidra) Ghidra Radare2 Затрону поверхностно windbg, binary ninja. pdf - Free ebook download as PDF File (. Patching Binaries (with vim, Binary Ninja, Ghidra and radare2) - bin 0x2F.
    [Show full text]
  • MISP Objects
    MISP Objects MISP Objects Introduction. 7 Funding and Support . 9 MISP objects. 10 ail-leak . 10 ais-info . 11 android-app. 12 android-permission. 13 annotation . 15 anonymisation . 16 asn . 20 attack-pattern . 22 authentication-failure-report . 22 authenticode-signerinfo . 23 av-signature. 24 bank-account. 25 bgp-hijack. 29 bgp-ranking . 30 blog . 30 boleto . 32 btc-transaction . 33 btc-wallet . 34 cap-alert . 35 cap-info. 39 cap-resource . 43 coin-address . 44 command . 46 command-line. 46 cookie . 47 cortex . 48 cortex-taxonomy . 49 course-of-action . 49 covid19-csse-daily-report . 51 covid19-dxy-live-city . 53 covid19-dxy-live-province . 54 cowrie . 55 cpe-asset . 57 1 credential . 67 credit-card . 69 crypto-material. 70 cytomic-orion-file. 73 cytomic-orion-machine . 74 dark-pattern-item. 74 ddos . 75 device . 76 diameter-attack . 77 dkim . 79 dns-record . ..
    [Show full text]