再谈Win7 x64 Explorer.exe R6025错误

虽然平时不怎么关机,但是每次重启系统之后都会看到这个蛋疼的R6025错误也是一件很蛋疼的事情,以前曾经尝试过解决这个问题,虽然当时是没有什么问题了,但是后来这个问题却又出现了(传送门链接:http://www.h4ck.org.cn/2012/11/win7-x64-explorer-exe-r6025-pure-virtual-function-call/)。

今天又看到这个鸟错误,实在受不了鸟,于是直接操起windbg挂在exporer.exe进行调试。启动之后会发现调用堆栈基本没什么东西。

转到未处理的异常,然后中断调试,查看调用堆栈:

0:028> gn
Mon Dec 17 15:56:44.025 2012 (UTC + 8:00): (a08.9d4): Break instruction exception - code 80000003 (first chance)
ntdll!DbgBreakPoint:
00000000`76e60530 cc              int     3
0:028> k
Child-SP          RetAddr           Call Site
00000000`0636f958 00000000`76f07ef8 ntdll!DbgBreakPoint
00000000`0636f960 00000000`7684652d ntdll!DbgUiRemoteBreakin+0x38
00000000`0636f990 00000000`76e3c521 kernel32!BaseThreadInitThunk+0xd
00000000`0636f9c0 00000000`00000000 ntdll!RtlUserThreadStart+0x21
Continue Reading

Acer 5742G Bios(1.30)修改

各种笔记本的Bios基本上都被厂商设置了各种限制,剩下可以修改的选项寥寥无几,而如果想要进行一些高级配置却没有什么办法。于是就只能自己想办法解决了,例如宏基的笔记本就只剩下了这么几个选项。

说实话,这几个选项基本没什么太大的用处,而我要改bios也不是对什么修改启动画面有兴趣,那个东东其实没虾米意思。

Continue Reading

The Art of Unpacking

The Art of Unpacking
by Mark Vincent Yason
=====================================================
=====================================================

Abstract: Unpacking is an art—it is a mental challenge and is one of the most exciting mind
games in the reverse engineering field. In some cases, the reverser needs to know the
internals of the operating system in order to identify or solve very difficult anti-reversing tricks
employed by packers/protectors, patience and cleverness are also major factors in a
successful unpack. This challenge involves researchers creating the packers and on the other
side, the researchers that are determined to bypass these protections.

The main purpose of this paper is to present anti-reversing techniques employed by
executable packers/protectors and also discusses techniques and publicly available tools that
can be used to bypass or disable this protections. This information will allow researchers,
especially, malcode analysts to identify these techniques when utilized by packed malicious
code, and then be able decide the next move when these anti-reversing techniques impede
successful analysis. As a secondary purpose, the information presented can also be used by
researchers that are planning to add some level of protection in their software by slowing
down reversers from analyzing their protected code, but of course, nothing will stop a skilled,
informed, and determined reverser.

Continue Reading

VS 2012示例代码浏览器

安装地址:http://visualstudiogallery.msdn.microsoft.com/4934b087-e6cc-44dd-b992-a71f00a2a6df

亮点介绍

集成丰富的示例代码搜索

Visual Studio 示例代码浏览器和Visual Studio无缝集成。充分利用Visual Studio界面让你在开发过程中轻松搜索示例代码。譬如,当你在Visual Studio中编辑代码时,你可以选中一段API或代码段,敲击Alt+F1快捷键或右键选择Search Code Samples,便可针对所选择API搜索相关示例代码。

Continue Reading