Vulnerability Development mailing list archives

Re: ndisasm bad opcodes interpretation


From: "Dave Korn" <davek_throwaway () hotmail com>
Date: Fri, 7 Jan 2005 18:42:17 -0000


"shadown" <shadown () gmail com> wrote in message
news:d8360fbf0501070830475ef080 () mail gmail com...


i.e:
0000001C 7565 jnz 0x83
sould had been jnz 0x65

  No it shouldn't. Engage brain before opening mouth:  what is 0x65 + 0x1e
(== address of byte immediately after the instruction in question)?  Google
"pc-relative branch displacement" for more.  Or learn some assembler
programming before trying to use a disassembler.

    cheers,
      DaveK
-- 
Can't think of a witty .sigline today....




Current thread: