Exetools

Exetools (https://forum.exetools.com/index.php)
-   General Discussion (https://forum.exetools.com/forumdisplay.php?f=2)
-   -   IDA Pro - New ARM decompiler (https://forum.exetools.com/showthread.php?t=12800)

reversing_solo 05-14-2010 20:31

IDA Pro - New ARM decompiler
 
I don't know who can be interested in that (for me it's a nice news!) but IDA developers will release con an ARM decompiler. You can look at a preview here:

h**tp://hex-rays.com/video/arm_decompiler_beta.html

Cheers,

jonwil 05-14-2010 22:04

I am sure that when this thing is released, many shops that make big money off unlocking mobile phones will be buying copies to aid with finding unlock tricks for the newest phones.

And when it eventually leaks, iPhone OS jail-breakers and hackers will be using it to hack the device even more (for jail-breaks, unlocks etc)

With the number of devices running ARM chips (and the large amount of those devices which are locked down in various ways), I am sure that this new tool will be a hit.

zhide1983 06-03-2010 10:30

some 'anti-' tech should be considered to use in embed field, haha

Squidge 06-27-2010 02:37

I wonder how different this is to just using IDA 5.5 + HR Decompiler?

EDIT: Errm, ignore me. Current HR Decompiler only support x86. Doh!

minux 07-28-2010 15:16

Yeah, maybe we could open a new forum discussing embedded hacking?

Deeply-embedded software these days doesn't use any anti- method.
But, I'm quite interested in it. (After all, their code is in flash, and ARM is a RISC.
And RAM is limited.)

pfzhao 08-02-2010 21:52

Just,IDA Pro add more or new Plug,e. python and other!, I think ,they want make the code anaysis VM and the use the Script-lang In it.

new_profile 08-03-2010 04:48

Quote:

Originally Posted by minux (Post 68906)
Yeah, maybe we could open a new forum discussing embedded hacking?

Deeply-embedded software these days doesn't use any anti- method.
But, I'm quite interested in it. (After all, their code is in flash, and ARM is a RISC.
And RAM is limited.)

Time ago, I've integrated a library for DVB descrambling running on an ARM based processor. All names and strings are obfuscated (even thread names) and it add many anti-debugging tricks like RDTSC equivalent instruction. I've tried debugging it remotely using a gdb client but it always detect my debugging session.
On the other side, I've worked on projects (embedded linux) where companies linked their executable against libraries with debug symbols included (not stripped and with -g or -ggdb flags activated) and they are not aware of the security risk.

Cheers


All times are GMT +8. The time now is 06:29.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2022, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX