Uploaded by Đạt Hoàng

IAM302 - Lab 15

advertisement
Hoàng Tiến Đạt
SE162085
15a. Data Encoding
*PartTitle
Beacons
Using Wireshark, we can get random letters:
V0lOLUpXQlBQWlNY
Strings
the STRING:
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz01234567
89+/
IDA Pro
Searching for all occurrences that contain XOR
XorEncode_DATHT xrefs to
Call these functions:
FindResourceA
SozeofResource
GlobalAlloc
LoadResource
LockResource
PEview
WinHex
Modify data
Modified data
15b.1. Patching an EXE
Run the EXE
Examining EXE file with x32dbg
Modified one
Run it
Exported the modified exe file
*Get CRC32 hash file
a1dccbf4
Gather result
0000.exe
J
0000a.exe
Instead of changing all into NOP, we can make it go straight to the answer from
JNE if we input the wrong answer
A
000a1.exe
Like the above techique
[
The answer : JA[
Patching 19 EXEs
After found out this sequence in 19 exe files
I just make it go through straight to the result.
BEFORE
AFTER
After seeing this, I can find out "75 1E" from any HEX editor to find its index in file
The idea:
Hex 75 is at index 1083th
Hex 1E is at index 1084th
I need to change "75 1E" to "75 00"
CODING TIME
Output
On the Terminal
SUM UP
The end.
Download