大杀器Unidbg真正的威力

看雪论坛作者ID:至尊小仙侠
论2021如何处理 arm vmp?
有图有真相 Unidbg的杀手锏 CPU指令级别Trace

callFunction:
那么我们在分析So的过程中,发现了一个非JNI函数能不能主动调用呢?答案是必须能。

public final Number[] callFunction(Emulator<?> emulator, String symbolName, Object... args) {
Symbol symbol = findSymbolByName(symbolName, false);
if (symbol == null) {
throw new IllegalStateException("find symbol failed: " + symbolName);
}
if (symbol.isUndef()) {
throw new IllegalStateException(symbolName + " is NOT defined");
}
return symbol.call(emulator, args);
}
emulator = createARMEmulator();
private static void CallVMPFunc(Module module,AndroidEmulator emulator){
try {
Symbol malloc = module.findSymbolByName("malloc");
Symbol free = module.findSymbolByName("free");
MemoryBlock block = MemoryAllocBlock.malloc(emulator,malloc,free,0x1000);
MemoryBlock namebyte = MemoryAllocBlock.malloc(emulator,malloc,free,0x1000);
UnidbgPointer blockpoint = block.getPointer();
UnidbgPointer namepoint = namebyte.getPointer();
String name = "magicillusion";
String data = "hello worid";
namepoint.write(name.getBytes());
blockpoint.write(data.getBytes());
Number[] ret = module.callFunction(emulator,0x13B30+1,namepoint,blockpoint,2);
UnidbgPointer ret1 = new UnidbgPointer(emulator,ret[0].intValue(),4);
String string = ret1.getString(0);
System.out.println("Number => " + (string));
} finally {
}
}
大杀器内置的HOOK框架
// 1. 获取HookZz对象
IHookZz hookZz = HookZz.getInstance(emulator); // 加载HookZz,支持inline hook,文档看https://github.com/jmpews/HookZz
// 2. enable hook
hookZz.enable_arm_arm64_b_branch(); // 测试enable_arm_arm64_b_branch,可有可无
index = 0;
hookZz.replace(module.findSymbolByName("lrand48"), new ReplaceCallback() {
@Override
public void postCall(Emulator<?> emulator, HookContext context) {
((EditableArm32RegisterContext)context).setR0(0x12345678);
int ptrace_args0 = context.getIntArg(0);
System.out.println("lrand48=" + ptrace_args0);
}
},true);
//aesdecode hook
hookZz.wrap((module.base)+0x39634+1, new WrapCallback<RegisterContext>() { // inline wrap导出函数
UnidbgPointer addr = null;
@Override
// 4. 方法执行前
public void preCall(Emulator<?> emulator, RegisterContext ctx, HookEntryInfo info) {
addr= ctx.getPointerArg(0);
UnidbgPointer pointerArg = ctx.getPointerArg(1);
UnidbgPointer pointer = pointerArg.getPointer(12);
int anInt = pointerArg.getInt(8);
byte[] byteArray = pointer.getByteArray(0, anInt);
String s =xuzi1(byteArray);
System.out.println("aes aesdecode= " + s);
}
@Override
// 5. 方法执行后
public void postCall(Emulator<?> emulator, RegisterContext ctx, HookEntryInfo info) {
byte[] aaaa = addr.getPointer(0).getPointer(12).getByteArray(0,0x30);
String s =xuzi1(aaaa);
System.out.println("aes aesdecode1= " + s);
}
});
看雪ID:至尊小仙侠
https://bbs.pediy.com/user-home-873999.htm
官网:https://www.bagevent.com/event/6334937

# 往期推荐
2. CVE-2021-26708 利用四字节释放特定地址,修改内存
3.网刃杯逆向wp


球分享

球点赞

球在看

点击“阅读原文”,了解更多!
[广告]赞助链接:
关注数据与安全,洞悉企业级服务市场:https://www.ijiandao.com/
让资讯触达的更精准有趣:https://www.0xu.cn/

随时掌握互联网精彩
- 起底蚂蚁 SOFAStack 十六年技术演进,打造 AI 时代的云应用底座
- 内存占用减少3.7%,开发者发布补丁集减少编译Linux内核时的最大内存
- wibu证书 - 初探
- B站大量虚拟主播被集体强制退款:收入蒸发,还倒欠B站;乔布斯被追授美国总统自由勋章;Grafana 9 发布|极客头条
- 微信推出群聊消息置顶功能;软银调整 Arm 上市计划,同时登陆英国美国;MIT 工程师构建类似乐高的 AI 芯片|极客头条
- 华为轮值董事长胡厚崑:没有自建芯片厂计划;苹果赔偿1亿美元给App开发者;Git.io停用|极客头条
- 游戏核心资产保护,迎来硬核救星
- 人工智能竞赛-目标识别指导
- 年初四,扫尘土|骁龙虎年限定壁纸
- 喜提加班,程序员晒元宵节福利,有一样的吗?
- 小米 11 不送充电器;苹果已修复 iCloud 登录激活问题;Ruby 3.0.0 发布|极客头条
- 《Ghidra操作手册》带你玩转软件逆向!
赞助链接