Vulnerability Development mailing list archives
Re: shellcode -> asm?
From: Paweł Krawczyk <kravietz () aba krakow pl>
Date: Mon, 14 Oct 2002 13:31:23 +0200
On Tue, Oct 08, 2002 at 10:34:29PM +0200, Jedi/Sector One wrote:
I'm familiar with how to do the reverse in gdb, but is it possible to do what I want? To restate: shellcode -> asm is what I need.gdb can disassemble. disassemble <start address> <end address>
You might try Fenris http://razor.bindview.com/tools/fenris/ for a really good reverse engineering tool. Also in Fenris documentation there's lots of links of "competing" projects. -- Paweł Krawczyk, Kraków, Poland http://echelon.pl/kravietz/ horses: http://kabardians.com/ crypto: http://ipsec.pl/
Current thread:
- shellcode -> asm? Sean Zadig (Oct 08)
- Re: shellcode -> asm? Eloy A. Paris (Oct 08)
- Re: shellcode -> asm? Stephen (Oct 08)
- Re: shellcode -> asm? Erik Sperling Johansen (Oct 08)
- Re: shellcode -> asm? Enrique A . Compañ Gzz . (Oct 08)
- RE: shellcode -> asm? Riley Hassell (Oct 08)
- Re: shellcode -> asm? Simon 'corecode' Schubert (Oct 09)
- Re: shellcode -> asm? Jedi/Sector One (Oct 10)
- Re: shellcode -> asm? Paweł Krawczyk (Oct 14)
- <Possible follow-ups>
- RE: shellcode -> asm? Sean Zadig (Oct 09)
- Re: shellcode -> asm? stallman (Oct 24)
- Re: shellcode -> asm? Sean Zadig (Oct 24)