Before i begin, I m glad that you choose to write this tutorial series. Great work!! I m troubled by a trivial problem with the scope of !jutsu searchOpcode.. when i use !jutsu it will only show me result of binary that is loaded into and will not search for opcode in all the loaded dll’s. Could you tell me what exactly is the problem? and how to exactly handle the scope of !jutsu. is there any way to increase the scope of search using !jutsu. I m using Windbg 6.11.0001.404 and byakugan.dl is downloaded recently ===== CONSOLE SNAPSHOT ===== 0:000> !load byakugan 0:000> !pattern_offset 5000 [Byakugan] Control of ecx at offset 612. [Byakugan] Control of eip at offset 612. 0:000> !jutsu searchOpcode pop esi | pop ebx | ret [J] Searching for: > pop esi > pop ebx > ret [J] Machine Code: > 5e 5b c3 ===== END CONSOLE ===== Thanks in advance
Hi cr01nk, I have forwarded your comment/question to the byakugan developer, but did not get a reply (yet). Stay tuned
update : searchOpcode does search in all of the addressable memory – not sure why it’s not working for you. Did you manage find a working address for pop esi | pop ebx | ret in the loaded module/executable binary using another technique ?
I m using findjmp right now and sometimes s -d 0x00000000 L?0xffffffff 5E 5B C3 I followed all the instructions that you told above in the tutorial again and again on different machine but i could not get !justu work. earlier i only tried for searchOpcode by now i have checked for identBuff it seems like only !pattern_offset is working and non !jutsu commands are working
what OS/SP level are you using ? I had some issues getting to run byakugan properly on XP SP3 – If that is the OS you are using, let me know (and I’ll see if I can shoot you the XPSP3 version of the dll’s)
@peter : Thanks for your help Issue resolved: I was using previously using old dll compiled on 18 nov 2008 on windbg installed in c:\program…\Debugging.. (x86)\windbg.exe I reinstalled the windbg in c:\windbg\windbg.exe folder and installed svn updated dll issued on 16th sep 2009. This worked for me, if anyone is also having the same problem try this.
hi peter thanks for this tutorials when I write !jutsu identBuf file myShell c:\shell.txt c0000005 Exception in byakugan.jutsu debugger extension. PC: 77c1d572 VA: 00000000 R/W: 0 Parameter: 0001003f what is the problems beast wishes
hi DarkC0de, can you post your question here : http://www.corelan.be:8800/index.php/forum/exploit-writing-debuggers/ thanks Peter
“want to build your own custom debugger, as explained in the awesome Gray Hay Python book” AWESOME, indeed 😉
Great tutorials… Well, i was writing exploit as SEH based for BlazeDVD 6.0, but found that it also have a buffer overflow at 260 offset. So that worked.
Thanks for the tutorials. I’ve recently encounter a problem. When I open the blazecrash.plf file (through blazeDVD), my the application does not die.