2012年3月10日

几种ARM反汇编器

摘要: http://blog.claudxiao.net/2011/12/arm-disassemblers/最近在为androguard实现ARM反汇编和ARM漏洞利用代码检测的功能。Anthony告诉我三种方案:smiasm、radare、IDAPython。前段时间尝试了这些方法,各有优劣。归纳如下:方案开源支持Thumb递归反汇编提供指令详情smiasm是否是是radare是是否否IDAPython否是是是下面是详细情况:smiasmsmiasm是一个纯Python的反汇编框架。它由三个子项目构成,其中elfesteem实现ELF和PE格式解析,miasm实现反汇编。smiasm的代码使用了 阅读全文

posted @ 2012-03-10 23:44 androidme 阅读(3507) 评论(0) 推荐(1) 编辑

IDA - Support for Android

摘要: http://www.hex-rays.com/products/ida/6.1/index.shtmlSupport for AndroidThe long awaited Android support in IDA is ready! The new version can disassemble Android bytecode (Dalvik). An IDA user kindly contributed the processor module and file loader (thank you!) A screenshot for your pleasure:Dalvik.. 阅读全文

posted @ 2012-03-10 23:10 androidme 阅读(368) 评论(0) 推荐(0) 编辑

Hex-Rays

摘要: http://www.hex-rays.com/Hex-Rays is a hi-tech company focused on binary software analysis. We strive to deliver the best products and excellent service.IDA is the Interactive DisAssembler: the world's smartest and most feature-full disassembler, which many software security specialists are famil 阅读全文

posted @ 2012-03-10 22:22 androidme 阅读(330) 评论(0) 推荐(1) 编辑

Practice of Android Reverse Engineering

摘要: http://0xlab.org/~jserv/android-reverse.pdfhttps://deepsec.net/docs/Slides/DeepSec_2010_Reverse_Forensics.pdfhttp://www.slideshare.net/jserv/practice-of-android-reverse-engineering 阅读全文

posted @ 2012-03-10 22:19 androidme 阅读(301) 评论(0) 推荐(0) 编辑

ARM工具链中的概念——EABI

摘要: http://blog.csdn.net/flagyan/article/details/6166107EABI(Embedded Application Binary Interface),嵌入式应用程序二进制接口。ABI的定义ABI描述应用程序与操作系统、应用程序与库、应用程序的组成部分之间的低层接口。ABI允许编译好的目标代码在使用兼容ABI的系统中无需改动就能运行。EABI的具体定义Codesourcery上有一个这样的QA:https://support.codesourcery.com/GNUToolchain/kbentry32QuestionWhat is the ABI fo 阅读全文

posted @ 2012-03-10 22:07 androidme 阅读(878) 评论(0) 推荐(1) 编辑

[AndroidTips]jni读取assets资源文件

摘要: http://blog.csdn.net/fontlose/article/details/6686161assets目录底下的文件会被打包到一个apk文件里,这些资源在安装时他们并没被解压,使用时是直接从apk中读取的。这里介绍下怎么在jni内使用 ndk自带api的接口函数读取assets资源文件,和libzip库函数的使用,可以用来读创建修改压缩文档,这里也是以读取apk安装包内的资源文 件为例。1 用ndk自带的接口函数读apk包,从2.3开始提供这些接口函数,具体看头文件assert.h android/asset_manager.h android/asset_manager_jn 阅读全文

posted @ 2012-03-10 20:04 androidme 阅读(1166) 评论(0) 推荐(1) 编辑

use addr2line in android

摘要: Let's say that logcat show you the following crash log (this is from one of my projects):I/DEBUG ( 31): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***I/DEBUG ( 31): Build fingerprint: 'generic/sdk/generic:2.3/GRH55/79397:eng/test-keys'I/DEBUG ( 31): pid: 378, tid: 386 &g 阅读全文

posted @ 2012-03-10 18:04 androidme 阅读(698) 评论(0) 推荐(0) 编辑

Android ndk-stack tool

摘要: Android ndk-stack tool----------------------Introduction:-------------This document describes the 'ndk-stack' tool that is distributed withthe Android NDK, since release r6.Overview:---------'ndk-stack' is a simple tool that allows you to filter stack traces as theyappear in the outp 阅读全文

posted @ 2012-03-10 17:57 androidme 阅读(1638) 评论(0) 推荐(1) 编辑

导航