viernes, 26 de enero de 2024

Reversing Some C++ Io Operations

In general decompilers are not friendly with c++ let's analyse a simple program to get familiar with it.
Let's implement a simple code that loads a file into a vector and then save the vector with following functions:

  • err
  • load
  • save
  • main


Lets identify the typical way in C++ to print to stdout with the operator "<<"


The basic_ostream is initialized writing the word "error" to the cout, and then the operator<< again to add the endl.




The Main function simply calls  "vec = load(filename)"  but the compiler modified it and passed the vector pointer as a parámeter. Then it bulds and prints "loaded  " << size << " users".
And finally saves the vector to /tmp/pwd and print "saved".
Most of the mess is basically the operator "<<" to concat and print values.
Also note that the vectors and strings are automatically deallocated when exit the function.


And here is the code:


Let's take a look to the load function, which iterates the ifs.getline() and push to the vector.
First of all there is a mess on the function definition, __return_storage_ptr is the vector.
the ifstream object ifs is initialized as a basic_ifstream and then operator! checks if it wasn't possible to open the file and in that case calls err()
We see the memset and a loop, getline read a cstr like line from the file, and then is converted to a string before pushing it to the vector. lVar1 is the stack canary value.

In this situations dont obfuscate with the vector pointer vec initialization at the begining, in this case the logic is quite clear.



The function save is a bit more tricky, but it's no more than a vector iteration and ofs writing.
Looping a simple "for (auto s : *vec)" in the decompiler is quite dense, but we can see clearly two write, the second write DAT_0010400b is a "\n"



As we see, save implememtation is quite straightforward.




More info

  1. Black Hat Hacker Tools
  2. Pentest Tools Online
  3. Hacker Tools Software
  4. Hacking Tools Pc
  5. Pentest Tools Website
  6. Hacking Tools
  7. Pentest Tools Url Fuzzer
  8. Hacker Tools Software
  9. Pentest Tools Apk
  10. Hacker Tools For Windows
  11. Hacking Tools For Windows Free Download
  12. Hacking Tools For Kali Linux
  13. Hack Tools Github
  14. Pentest Tools Url Fuzzer
  15. Pentest Tools Review
  16. Tools For Hacker
  17. Top Pentest Tools
  18. Hacker Tools
  19. Hacking Tools Hardware
  20. Pentest Recon Tools
  21. Pentest Tools Linux
  22. How To Install Pentest Tools In Ubuntu
  23. Bluetooth Hacking Tools Kali
  24. What Is Hacking Tools
  25. Termux Hacking Tools 2019
  26. Hacker Tools Online
  27. Hacking Tools For Games
  28. Pentest Tools
  29. Pentest Tools Github
  30. Hack Tools
  31. Pentest Tools Kali Linux
  32. Hacking Tools Pc
  33. Pentest Tools Subdomain
  34. Hacking Tools For Beginners
  35. Hack Tool Apk
  36. Blackhat Hacker Tools
  37. Hacking Tools For Kali Linux
  38. Hacking Tools For Windows
  39. Hack Tools For Ubuntu
  40. Hacking Tools For Beginners
  41. Pentest Tools Free
  42. Wifi Hacker Tools For Windows
  43. Pentest Tools Website Vulnerability
  44. Hacking Tools Download
  45. Hacker Tools Online
  46. Hack Tools Pc
  47. Hacking Tools Github
  48. Pentest Tools Tcp Port Scanner
  49. Hacker Tools 2020
  50. Black Hat Hacker Tools
  51. Hacker Tools Github
  52. Hacker Tools For Ios
  53. Top Pentest Tools
  54. Pentest Tools Framework
  55. Underground Hacker Sites
  56. Pentest Tools List
  57. Hacker Tool Kit

No hay comentarios:

Publicar un comentario

Seguidores

Archivo del blog