Re: shellcode -> asm?

From: Paweł Krawczyk (kravietzat_private)
Date: Mon Oct 14 2002 - 04:31:23 PDT

  • Next message: Dan Kaminsky: "Re: CROSS SITE-SCRIPTING Protection with PHP"

    On Tue, Oct 08, 2002 at 10:34:29PM +0200, Jedi/Sector One wrote:
    
    > > I'm familiar with how to do 
    > > the reverse in gdb, but is it possible to do what I want? To restate:
    > > shellcode -> asm is what I need.
    > gdb can disassemble.
    > disassemble <start address> <end address>
    
    You might try Fenris http://razor.bindview.com/tools/fenris/
    for a really good reverse engineering tool. Also in Fenris
    documentation there's lots of links of "competing" projects.
    
    -- 
    Paweł Krawczyk, Kraków, Poland  http://echelon.pl/kravietz/
    horses: http://kabardians.com/
    crypto: http://ipsec.pl/
    



    This archive was generated by hypermail 2b30 : Mon Oct 14 2002 - 10:51:02 PDT