高级C代码的汇编分析

在windows上,常用的函数调用方式有:

Pascal方式,WINAPI(_stdcall)方式 和C方式(_cdecl)

_cdecl调用规则:

1,参数从右到左入堆栈

2,在函数返回后,调用者要负责清除堆栈

所以这种调用常会生成较大的可执行文件。

 

_stdcall又称为WINAPI调用方式,规则:

1,参数从右向左入堆栈

2,被调用的函数在返回前自行清理堆栈

所以这种调用会生成比cdecl小的代码

 

Pascal调用方式,主要用在WIN16函数库中,现在基本不用

规则:

1,参数从左向右入堆栈

2,被调用函数在返回前自行清理堆栈

 

此外,在Windows内核中还常见的有快速调用方式(_fastcall)

在C++编译的代码中有this call方式(_thiscall)

 

在windows中,不管哪种方式,返回值都写在eax中,外部从中获取返回值

 

_cdecl方式步骤

1,保存ebp

2,保存esp到ebp

3,在堆栈中腾出一个区域来保存局部变量

4,保存ebx,esi,edi到堆栈中,函数调用完后返回

5,把局部变量区域初始化为0xcccccccch,实际上是int 3指令机器码,这是一个断点软中断

6,做函数里应该做的事情

7,恢复ebx,esi,edi,esp,ebp,最后返回

2:    int func(int a,int b)
3:    {
00401010   push        ebp
00401011   mov         ebp,esp
00401013   sub         esp,44h
00401016   push        ebx
00401017   push        esi
00401018   push        edi
00401019   lea         edi,[ebp-44h]
0040101C   mov         ecx,11h
00401021   mov         eax,0CCCCCCCCh
00401026   rep stos    dword ptr [edi]
4:        int c = a + b;
00401028   mov         eax,dword ptr [ebp+8]
0040102B   add         eax,dword ptr [ebp+0Ch]
0040102E   mov         dword ptr [ebp-4],eax
5:        return c;
00401031   mov         eax,dword ptr [ebp-4]
6:    }
00401034   pop         edi
00401035   pop         esi
00401036   pop         ebx
00401037   mov         esp,ebp
00401039   pop         ebp
0040103A   ret

 

 

for循环的汇编代码分析:

 

6:        int i;
7:        for(i = 0 ;i < 50 ; i ++)
0040B501   mov         dword ptr [ebp-8],0
0040B508   jmp         func+33h (0040b513)
0040B50A   mov         ecx,dword ptr [ebp-8]
0040B50D   add         ecx,1
0040B510   mov         dword ptr [ebp-8],ecx
0040B513   cmp         dword ptr [ebp-8],32h
0040B517   jge         func+44h (0040b524)
8:            c = c + i;
0040B519   mov         edx,dword ptr [ebp-4]
0040B51C   add         edx,dword ptr [ebp-8]
0040B51F   mov         dword ptr [ebp-4],edx
0040B522   jmp         func+2Ah (0040b50a)
9:
10:       return c;
0040B524   mov         eax,dword ptr [ebp-4]
11:   }

 

 从上面的汇编代码可以分析出,for循环就是cmp指令+jmp指令

根据cmp判断然后跳转到那个位置执行代码

 

do...while循环分析

5:
6:        int i = 0;
0040B501   mov         dword ptr [ebp-8],0
7:
8:        do {
9:            c = c +i;
0040B508   mov         ecx,dword ptr [ebp-4]
0040B50B   add         ecx,dword ptr [ebp-8]
0040B50E   mov         dword ptr [ebp-4],ecx
10:       }while(c < 50);
0040B511   cmp         dword ptr [ebp-4],32h
0040B515   jl          func+28h (0040b508)
11:
12:       return c;
0040B517   mov         eax,dword ptr [ebp-4]
13:   }
0040B51A   pop         edi
0040B51B   pop         esi
0040B51C   pop         ebx
0040B51D   mov         esp,ebp
0040B51F   pop         ebp
0040B520   ret

 

 从上面代码可以看出

本质do...while循环和for差不多

 

while循环:

6:        int i = 0;
0040B501   mov         dword ptr [ebp-8],0
7:
8:        while(i < 50)
0040B508   cmp         dword ptr [ebp-8],32h
0040B50C   jge         func+39h (0040b519)
9:        {
10:           c = c +i;
0040B50E   mov         ecx,dword ptr [ebp-4]
0040B511   add         ecx,dword ptr [ebp-8]
0040B514   mov         dword ptr [ebp-4],ecx
11:       };
0040B517   jmp         func+28h (0040b508)
12:
13:       return c;
0040B519   mov         eax,dword ptr [ebp-4]
14:   }
0040B51C   pop         edi
0040B51D   pop         esi
0040B51E   pop         ebx
0040B51F   mov         esp,ebp
0040B521   pop         ebp
0040B522   ret

 

 

if...else if...else语句分析

:
6:        int i = 0;
0040B501   mov         dword ptr [ebp-8],0
7:
8:        if(c>0 && c < 10)
0040B508   cmp         dword ptr [ebp-4],0
0040B50C   jle         func+43h (0040b523)
0040B50E   cmp         dword ptr [ebp-4],0Ah
0040B512   jge         func+43h (0040b523)
9:        {
10:           printf("c > 0");
0040B514   push        offset string "c > 0" (0041ff5c)
0040B519   call        printf (0040b780)
0040B51E   add         esp,4
11:       }
12:       else if(c>10 && c<00)
0040B521   jmp         func+6Bh (0040b54b)
0040B523   cmp         dword ptr [ebp-4],0Ah
0040B527   jle         func+5Eh (0040b53e)
0040B529   cmp         dword ptr [ebp-4],0
0040B52D   jge         func+5Eh (0040b53e)
13:       {
14:           printf("c>10 && c<100");
0040B52F   push        offset string "c>10 && c<100" (0041ff4c)
0040B534   call        printf (0040b780)
0040B539   add         esp,4
15:       }
16:       else
0040B53C   jmp         func+6Bh (0040b54b)
17:       {
18:           printf("c>10 && c < 100");
0040B53E   push        offset string "c>10 && c < 100" (0041ff3c)
0040B543   call        printf (0040b780)
0040B548   add         esp,4
19:       }
20:
21:       return c;
0040B54B   mov         eax,dword ptr [ebp-4]
22:   }
0040B54E   pop         edi
0040B54F   pop         esi
0040B550   pop         ebx
0040B551   add         esp,48h
0040B554   cmp         ebp,esp
0040B556   call        __chkesp (0040b4a0)
0040B55B   mov         esp,ebp
0040B55D   pop         ebp
0040B55E   ret

 

 

switch...case 代码分析

4:        int c = a + b;
0040B4F8   mov         eax,dword ptr [ebp+8]
0040B4FB   add         eax,dword ptr [ebp+0Ch]
0040B4FE   mov         dword ptr [ebp-4],eax
5:
6:        switch(c)
7:        {
0040B501   mov         ecx,dword ptr [ebp-4]
0040B504   mov         dword ptr [ebp-8],ecx
0040B507   cmp         dword ptr [ebp-8],0
0040B50B   je          func+35h (0040b515)
0040B50D   cmp         dword ptr [ebp-8],1
0040B511   je          func+42h (0040b522)
0040B513   jmp         func+51h (0040b531)
8:        case 0:
9:            printf("c>0");
0040B515   push        offset string "c>0" (0041ff4c)
0040B51A   call        printf (0040b780)
0040B51F   add         esp,4
10:       case 1:
11:           printf("c>10 && c<100");
0040B522   push        offset string "c>10 && c<100" (0041ff3c)
0040B527   call        printf (0040b780)
0040B52C   add         esp,4
12:           break;
0040B52F   jmp         func+5Eh (0040b53e)
13:       default:
14:           printf("c>10 && c<100");
0040B531   push        offset string "c>10 && c<100" (0041ff3c)
0040B536   call        printf (0040b780)
0040B53B   add         esp,4
15:       }
16:
17:       return c;
0040B53E   mov         eax,dword ptr [ebp-4]
18:   }
0040B541   pop         edi
0040B542   pop         esi
0040B543   pop         ebx
0040B544   add         esp,48h
0040B547   cmp         ebp,esp
0040B549   call        __chkesp (0040b4a0)
0040B54E   mov         esp,ebp
0040B550   pop         ebp
0040B551   ret

 

 

结构体分析

1:
2:    typedef struct {
3:        int a;
4:        int b;
5:        int c;
6:    }mystruct;
7:
8:    int func(int a,int b)
9:    {
0040B800   push        ebp
0040B801   mov         ebp,esp
0040B803   sub         esp,1D8h
0040B809   push        ebx
0040B80A   push        esi
0040B80B   push        edi
0040B80C   lea         edi,[ebp-1D8h]
0040B812   mov         ecx,76h
0040B817   mov         eax,0CCCCCCCCh
0040B81C   rep stos    dword ptr [edi]
10:
11:       unsigned char *buf[100];
12:       mystruct *strs = (mystruct *)buf;
0040B81E   lea         eax,[ebp-190h]
0040B824   mov         dword ptr [ebp-194h],eax
13:       int i;
14:       for(i=0; i<5; i++)
0040B82A   mov         dword ptr [ebp-198h],0
0040B834   jmp         func+45h (0040b845)
0040B836   mov         ecx,dword ptr [ebp-198h]
0040B83C   add         ecx,1
0040B83F   mov         dword ptr [ebp-198h],ecx
0040B845   cmp         dword ptr [ebp-198h],5
0040B84C   jge         func+94h (0040b894)
15:       {
16:           strs[i].a=0;
0040B84E   mov         edx,dword ptr [ebp-198h]
0040B854   imul        edx,edx,0Ch
0040B857   mov         eax,dword ptr [ebp-194h]
0040B85D   mov         dword ptr [eax+edx],0
17:           strs[i].b=1;
0040B864   mov         ecx,dword ptr [ebp-198h]
0040B86A   imul        ecx,ecx,0Ch
0040B86D   mov         edx,dword ptr [ebp-194h]
0040B873   mov         dword ptr [edx+ecx+4],1
18:           strs[i].c=2;
0040B87B   mov         eax,dword ptr [ebp-198h]
0040B881   imul        eax,eax,0Ch
0040B884   mov         ecx,dword ptr [ebp-194h]
0040B88A   mov         dword ptr [ecx+eax+8],2
19:       }
0040B892   jmp         func+36h (0040b836)
20:
21:       return 0;
0040B894   xor         eax,eax
22:   }
0040B896   pop         edi
0040B897   pop         esi
0040B898   pop         ebx
0040B899   mov         esp,ebp
0040B89B   pop         ebp
0040B89C   ret

 

 

从上面不难看出,结构体赋值是先经过计算,然后把基址存放的一个变量

然后计算每个结构体的偏移量,然后对每个struct进行定数累加赋值

 

枚举,联合,结构结合分析:

1:    typedef enum {
2:        ENUM_1 = 1,
3:        ENUM_2 = 2,
4:        ENUM_3,
5:        ENUM_4
6:    }myenum;
7:
8:    typedef struct {
9:        int a;
10:       int b;
11:       int c;
12:   }mystruct;
13:
14:   typedef union {
15:       mystruct s;
16:       myenum e[3];
17:   }myunion;
18:
19:   int func(int a,int b)
20:   {
00401020   push        ebp
00401021   mov         ebp,esp
00401023   sub         esp,0ACh
00401029   push        ebx
0040102A   push        esi
0040102B   push        edi
0040102C   lea         edi,[ebp-0ACh]
00401032   mov         ecx,2Bh
00401037   mov         eax,0CCCCCCCCh
0040103C   rep stos    dword ptr [edi]
21:       unsigned char buf[100] = {0};
0040103E   mov         byte ptr [ebp-64h],0
00401042   mov         ecx,18h
00401047   xor         eax,eax
00401049   lea         edi,[ebp-63h]
0040104C   rep stos    dword ptr [edi]
0040104E   stos        word ptr [edi]
00401050   stos        byte ptr [edi]
22:       myunion *uns = (myunion *)buf;
00401051   lea         eax,[ebp-64h]
00401054   mov         dword ptr [ebp-68h],eax
23:
24:       int i;
25:
26:       for(i = 0; i < 5; i++)
00401057   mov         dword ptr [ebp-6Ch],0
0040105E   jmp         func+49h (00401069)
00401060   mov         ecx,dword ptr [ebp-6Ch]
00401063   add         ecx,1
00401066   mov         dword ptr [ebp-6Ch],ecx
00401069   cmp         dword ptr [ebp-6Ch],5
0040106D   jge         func+83h (004010a3)
27:       {
28:           uns[i].s.a=0;
0040106F   mov         edx,dword ptr [ebp-6Ch]
00401072   imul        edx,edx,0Ch
00401075   mov         eax,dword ptr [ebp-68h]
00401078   mov         dword ptr [eax+edx],0
29:           uns[i].s.b = 1;
0040107F   mov         ecx,dword ptr [ebp-6Ch]
00401082   imul        ecx,ecx,0Ch
00401085   mov         edx,dword ptr [ebp-68h]
00401088   mov         dword ptr [edx+ecx+4],1
30:           uns[i].e[2] = ENUM_4;
00401090   mov         eax,dword ptr [ebp-6Ch]
00401093   imul        eax,eax,0Ch
00401096   mov         ecx,dword ptr [ebp-68h]
00401099   mov         dword ptr [ecx+eax+8],4
31:       }
004010A1   jmp         func+40h (00401060)
32:
33:       return 0;
004010A3   xor         eax,eax
34:   }
004010A5   pop         edi
004010A6   pop         esi
004010A7   pop         ebx
004010A8   mov         esp,ebp
004010AA   pop         ebp
004010AB   ret

 

 

 我们发现这段代码和上面的汇编后代码基本一样,因此我们知道,汇编中对共用体和枚举类型没有特别的处理

并不会引入新的代码,因为共用体和枚举都是方便给程序员用的,本质没什么改变

 

 其实上面这些控制语句,对反汇编来说很容易分析,逆向工程中最令人蛋疼的是算法

 

一个3*3矩阵算法的逆向分析

main函数

 int main()
13:   {
0040B640   push        ebp
0040B641   mov         ebp,esp
0040B643   sub         esp,0ACh
0040B649   push        ebx
0040B64A   push        esi
0040B64B   push        edi
0040B64C   lea         edi,[ebp-0ACh]
0040B652   mov         ecx,2Bh
0040B657   mov         eax,0CCCCCCCCh
0040B65C   rep stos    dword ptr [edi]
14:       int a[3][3] = {{1,2,3},{2,3,4},{3,4,5}};
0040B65E   mov         dword ptr [ebp-24h],1
0040B665   mov         dword ptr [ebp-20h],2
0040B66C   mov         dword ptr [ebp-1Ch],3
0040B673   mov         dword ptr [ebp-18h],2
0040B67A   mov         dword ptr [ebp-14h],3
0040B681   mov         dword ptr [ebp-10h],4
0040B688   mov         dword ptr [ebp-0Ch],3
0040B68F   mov         dword ptr [ebp-8],4
0040B696   mov         dword ptr [ebp-4],5
15:       int b[3][3] = {{2,3,4},{2,4,1},{6,2,1}};
0040B69D   mov         dword ptr [ebp-48h],2
0040B6A4   mov         dword ptr [ebp-44h],3
0040B6AB   mov         dword ptr [ebp-40h],4
0040B6B2   mov         dword ptr [ebp-3Ch],2
0040B6B9   mov         dword ptr [ebp-38h],4
0040B6C0   mov         dword ptr [ebp-34h],1
0040B6C7   mov         dword ptr [ebp-30h],6
0040B6CE   mov         dword ptr [ebp-2Ch],2
0040B6D5   mov         dword ptr [ebp-28h],1
16:       int c[3][3];
17:
18:       func(a,b,c);
0040B6DC   lea         eax,[ebp-6Ch]
0040B6DF   push        eax
0040B6E0   lea         ecx,[ebp-48h]
0040B6E3   push        ecx
0040B6E4   lea         edx,[ebp-24h]
0040B6E7   push        edx
0040B6E8   call        @ILT+5(_func) (0040100a)
0040B6ED   add         esp,0Ch
19:
20:       return 0;
0040B6F0   xor         eax,eax
21:   }
0040B6F2   pop         edi
0040B6F3   pop         esi
0040B6F4   pop         ebx
0040B6F5   add         esp,0ACh
0040B6FB   cmp         ebp,esp
0040B6FD   call        __chkesp (00401130)
0040B702   mov         esp,ebp
0040B704   pop         ebp
0040B705   ret

 

 

算法函数:

1:    int func(int a[3][3],int b[3][3],int c[3][3])
2:    {
0040B580   push        ebp
0040B581   mov         ebp,esp
0040B583   sub         esp,48h
0040B586   push        ebx
0040B587   push        esi
0040B588   push        edi
0040B589   lea         edi,[ebp-48h]
0040B58C   mov         ecx,12h
0040B591   mov         eax,0CCCCCCCCh
0040B596   rep stos    dword ptr [edi]
3:        int i,j;
4:        for(i = 0 ; i < 3; i++)
0040B598   mov         dword ptr [ebp-4],0
0040B59F   jmp         func+2Ah (0040b5aa)
0040B5A1   mov         eax,dword ptr [ebp-4]
0040B5A4   add         eax,1
0040B5A7   mov         dword ptr [ebp-4],eax
0040B5AA   cmp         dword ptr [ebp-4],3
0040B5AE   jge         func+0AAh (0040b62a)
5:        {
6:            for(j = 0 ; j < 3; j ++)
0040B5B0   mov         dword ptr [ebp-8],0
0040B5B7   jmp         func+42h (0040b5c2)
0040B5B9   mov         ecx,dword ptr [ebp-8]
0040B5BC   add         ecx,1
0040B5BF   mov         dword ptr [ebp-8],ecx
0040B5C2   cmp         dword ptr [ebp-8],3
0040B5C6   jge         func+0A5h (0040b625)
7:                c[i][j] = a[i][0]*b[0][j]+a[i][1]*b[1][j]+a[i][2]*b[2][j];
0040B5C8   mov         edx,dword ptr [ebp-4]
0040B5CB   imul        edx,edx,0Ch
0040B5CE   mov         eax,dword ptr [ebp+8]
0040B5D1   mov         ecx,dword ptr [ebp-8]
0040B5D4   mov         esi,dword ptr [ebp+0Ch]
0040B5D7   mov         edx,dword ptr [eax+edx]
0040B5DA   imul        edx,dword ptr [esi+ecx*4]
0040B5DE   mov         eax,dword ptr [ebp-4]
0040B5E1   imul        eax,eax,0Ch
0040B5E4   mov         ecx,dword ptr [ebp+8]
0040B5E7   mov         esi,dword ptr [ebp-8]
0040B5EA   mov         edi,dword ptr [ebp+0Ch]
0040B5ED   mov         eax,dword ptr [ecx+eax+4]
0040B5F1   imul        eax,dword ptr [edi+esi*4+0Ch]
0040B5F6   add         edx,eax
0040B5F8   mov         ecx,dword ptr [ebp-4]
0040B5FB   imul        ecx,ecx,0Ch
0040B5FE   mov         eax,dword ptr [ebp+8]
0040B601   mov         esi,dword ptr [ebp-8]
0040B604   mov         edi,dword ptr [ebp+0Ch]
0040B607   mov         ecx,dword ptr [eax+ecx+8]
0040B60B   imul        ecx,dword ptr [edi+esi*4+18h]
0040B610   add         edx,ecx
0040B612   mov         eax,dword ptr [ebp-4]
0040B615   imul        eax,eax,0Ch
0040B618   mov         ecx,dword ptr [ebp+10h]
0040B61B   add         ecx,eax
0040B61D   mov         eax,dword ptr [ebp-8]
0040B620   mov         dword ptr [ecx+eax*4],edx
0040B623   jmp         func+39h (0040b5b9)
8:        }
0040B625   jmp         func+21h (0040b5a1)
9:        return 0;
0040B62A   xor         eax,eax
10:   }
0040B62C   pop         edi
0040B62D   pop         esi
0040B62E   pop         ebx
0040B62F   mov         esp,ebp
0040B631   pop         ebp
0040B632   ret

 

 

从上面的代码我们可以看出,汇编对Debug模式的二位数组操作方式如下:

 

mov		eax,<数组元素下表>
imul	eax,eax,<结构体的大小>
mov		ecx,<结构体开始地址>
mov		eax,dword ptr [ecx+eax]
访问内部变量的时候,还要加上数字

mov     eax,dword ptr [ecx+eax+0CH]

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

posted @ 2014-06-02 01:58  lfsblack  阅读(1412)  评论(0编辑  收藏  举报