挂海论坛

 找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
 友情提示:文字/图片广告均非网站意见,请担保交易勿直接付款,由此产生的责任自负
玩游戏来117游戏网(H5不下载也能玩手游传奇,吃鸡,竞技都有)不懂社区·好资源不错过·各位资源站大佬欢迎来采集搬运寻找会做《单机》游戏修改器的开发作者长期合作,价格不是问题!联系QQ:1874088565
IOS签名/udid证书出售/送证书加群1040456405 ██【我要租此广告位】██.
.. .
查看: 2605|回复: 0
打印 上一主题 下一主题

[IDA Plugin] IDA Patcher 0.1

[复制链接]

83

积分

23

主题

4

听众
已帮网友解决0 个问题
好评
0
贡献
60
海币
653
交易币
0
跳转到指定楼层
楼主
发表于 2016-7-12 07:57:13 | 只看该作者 |只看大图 回帖奖励 |倒序浏览 |阅读模式
提醒:若下载的软件是收费的"请不要付款",可能是骗子,请立即联系本站举报,执意要付款被骗后本站概不负责。(任何交易请走第三方中介,请勿直接付款交易以免被骗!切记).

友情提示:文字/图片广告均非本站意见,请担保交易勿直接付款,由此产生的责任自负!!!↑↑


Installation
Simply copy IDApatcher.py into IDA's plugins folder. The plugin will be automatically loaded the next time you start IDA Pro.
Compatibility
The plugin uses pure IDA Python API, so it should be compatible with all versions of IDA on different platforms. However, it was only extensively tested on IDA Pro 6.5 for Windows with x86, x86-64 and ARM binaries.
User guide
This guide will walk you through various features of the plugin by examining and patching a simple program below:
.text:00401000 ; int __cdecl main(int argc, char **argv).text:00401000 _main           proc near .text:00401000.text:00401000 argc            = dword ptr  8.text:00401000 argv            = dword ptr  0Ch.text:00401000.text:00401000                 push    ebp.text:00401001                 mov     ebp, esp.text:00401003                 cmp     [ebp+argc], 0.text:00401007                 jz      short $LN6.text:00401009                 push    offset Format   ; "Terminating...\n".text:0040100E                 call    ds:__imp__printf.text:00401014                 add     esp, 4.text:00401017                 push    1               ; Code.text:00401019                 call    ds:__imp__exit.text:0040101F ; -------------------------------------------------------------------.text:0040101F.text:0040101F $LN6:                                   ; CODE XREF: _main+7j.text:0040101F                 push    offset aYouHavePatched ; "patched...".text:00401024                 call    ds:__imp__printf.text:0040102A                 add     esp, 4.text:0040102D                 xor     eax, eax.text:0040102F                 pop     ebp.text:00401030                 retn.text:00401030 _main           endp.text:00401030
As you can see, the program will always follow the "Terminating..." branch since the conditional jump at 00401007 will never be true (argc is normally greater than 0).
Let's patch the application to reverse the logic and change jz to jnz. The traditional way to do this in IDA is to open the Hex subview and change the appropriate byte corresponding to jz (0x74) to jnz(0x75) as follows:
At this point it is impossible to revert the patched byte to its original form or manage all of the patched bytes in the database without developing several one off IDA scripts.
IDA Patcher addresses this and many other use cases to make binary patching in IDA easy and convenient.
Patches subview
In order to quickly navigate and manage all of the applied patches, the plugin includes a new subview simply called Patches. To open the subview select View->Open subviews->Patches. It is the very last item after the Problems subview.
NOTE: You may need to select Refresh from the Edit submenu or press Ctrl-U to see the latest changes.
In the view above you can see the patch we have just made to the database together with the exact address, name of the function and segment, size, modified and original bytes as well as any comments at that location.
TIP: To quickly jump to the location of the patch in the IDA subview simply double-click on one of the entries in the Patches subview.
Fill selection
Let's make another modification to the database by filling a range of addresses with NOPs. To do this select a range of instructions or hex bytes from IDA or Hexsubviews respectively. Next, open the Fill selection dialog from Edit->Patch program and populate the value field with 0x90:
The start and end addresses of the selection are automatically populated; however, you can adjust them from the dialog. Press the Fill button to apply changes in the database and switch back to thePatches subview:
Notice that single byte patches were combined into larger consecutive buffers to make it easier to manage. The reason why there are two separate entries with NOPs instead of a single large one is due to the presence of the 0x90 byte somewhere in the original binary blob. As a result, IDA Patcher produced two separate entries since one byte in the middle was not actually updated. Here is the source of the issue:
.text:00401009 68 00 21 40 00                    push    offset Format .text:0040100E FF 15 90 20 40 00                 call    ds:__imp__printf.text:00401014 83 C4 04                          add     esp, 4.text:00401017 6A 01                             push    1               ; Code.text:00401019 FF 15 8C 20 40 00                 call    ds:__imp__exit
Filling a range of bytes with the same value is useful when you need to quickly NOP-out a series of instructions or simply fill a memory area with a known value in the debugger (e.g. 0xCC to break execution when landing in that memory area).
Restore original byte(s)
At this point you may decide to restore original byte values since it wasn't really necessary to overwrite that many bytes. To accomplish this select one or more entries from the Patches subview and click onRestore original byte(s)... menu entry by right clicking anywhere within the subview:
For each of the items in the selection, you will get a popup similar to the one below confirming the change:
NOTE: You will not be able to edit bytes when restoring them. If you want to edit patched bytes, use one of the methods described below
Press Restore to apply changes to the database.
Edit patch byte(s)
There are several ways to edit bytes in IDA Patcher depending on whether you are editing an existing patch or applying a new one.
The edit dialog to alter already patched bytes can be triggered by selecting Edit from the right-click context menu in the Patches subview:
Notice the variety of valid hex input representations that can be mixed together. You can safely input fewer or greater number of bytes than the original patch buffer. In the case of fewer bytes, the original bytes at the end will be restored. Inputting more than the original length will simply continue overwriting the database as expected.
You can also bring up a similar edit dialog by selecting a range of addresses from IDA or Hex views and clicking on the Edit->Patch Program->Edit Selection... menu item. All of the bytes in the selected range will be already populated in the dialog edit box; however, you are free to edit more or less than the selected buffer just like in the previous example. While similar to the previous method, this dialog allows you to create new patches instead of editing existing ones.
Import data
A powerful way of importing binary blobs into the database involves the use of Import data dialog. It can be opened from the Edit menu while IDA or Hex subviews are active. By selecting a range of memory addresses (or at least a starting point), you can paste large blobs of binary data from external files or pasted as hex bytes or string literals. The example below illustrates how to quickly inject shellcode into the stack memory area to aid in exploit development:
You can switch between different import types to change where the data is coming from and how to interpret it. For example, string literal type will interpret pasted buffer as raw bytes without trying to decode it as a hex values.
The trim to selection checkbox will ensure that imported data does not exceed specified address ranges by trimming whatever extra bytes at the end.
Applying Patches
With all of the modifications done to the IDA database you may want to apply them to the original input file. You have two identical ways of accomplishing this: using IDA's own Edit->Apply patches to input file... or the plugin's replica dialog which can be called from the right-click menu in the Patchessubview:
It is important to note that not all binary modifications in the database can be applied to the input file. For example, modifications done in the debugger example above can't be applied to the input file because stack memory area is dynamically generated and not linked to any particular segment in the original file. The screenshot above illustrates different icons associated with each patch entry: a little save disk icon for the patches that can be applied and a little red cross for the ones that can't be applied.
Just like in the original Apply patches to input file dialog, you have an option to create a backup file or simply restore the previously patched file to its original form. Once you click OK, all of the patches which can be applied will be stored in the specified input file.
Known bugs
  • 64-bit version of IDA Pro 6.5 for Windows does not correctly report selected address ranges (most significant 4 bytes appear to be zeroed out).
Special Note
Thank you Ilfak Guilfanov and Hex-Rays development team for the excellent product and quick support. The plugin would not be possible if not for Chris Eagle's excellent IDA Pro book from which I have learned about the world of IDA and reverse engineering, thank you sir!
References

idapatcher-0.1.zip (7.56 KB, 下载次数: 0)


联系我时,请说是在 挂海论坛 上看到的,谢谢!



上一篇:IDA 6.5 tools
下一篇:SmartDec decompiler 下载
免责声明:
1、本主题所有言论和图片纯属会员个人意见,与本论坛立场无关。一切关于该内容及资源商业行为与www.52ghai.com无关。

2、本站提供的一切资源内容信息仅限用于学习和研究目的;不得将上述内容用于商业或者非法用途,否则,一切后果请用户自负。

3、本站信息来自第三方用户,非本站自制,版权归原作者享有,版权争议与本站无关。您必须在下载后的24个小时之内,从您的电脑或手机中彻底删除上述内容。

4、如果您喜欢该程序,请支持正版,购买注册,得到更好的正版服务。如有侵犯你版权的,请邮件与我们联系删除(邮箱:xhzlw@foxmail.com),本站将立即改正。

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

免责声明|Archiver|手机版|小黑屋|挂海论坛

GMT+8, 2025-4-6 03:46 , Processed in 0.077298 second(s), 39 queries , Gzip On.

Powered by Discuz! X3.2

本站资源来自互联网用户收集发布,如有侵权请邮件与我们联系处理。xhzlw@foxmail.com

快速回复 返回顶部 返回列表