Tuesday, August 25, 2020

Reversing Some C++ Io Operations

In general decompilers are not friendly with c++ let's analyse a simple program to get familiar with it.
Let's implement a simple code that loads a file into a vector and then save the vector with following functions:

  • err
  • load
  • save
  • main


Lets identify the typical way in C++ to print to stdout with the operator "<<"


The basic_ostream is initialized writing the word "error" to the cout, and then the operator<< again to add the endl.




The Main function simply calls  "vec = load(filename)"  but the compiler modified it and passed the vector pointer as a parámeter. Then it bulds and prints "loaded  " << size << " users".
And finally saves the vector to /tmp/pwd and print "saved".
Most of the mess is basically the operator "<<" to concat and print values.
Also note that the vectors and strings are automatically deallocated when exit the function.


And here is the code:


Let's take a look to the load function, which iterates the ifs.getline() and push to the vector.
First of all there is a mess on the function definition, __return_storage_ptr is the vector.
the ifstream object ifs is initialized as a basic_ifstream and then operator! checks if it wasn't possible to open the file and in that case calls err()
We see the memset and a loop, getline read a cstr like line from the file, and then is converted to a string before pushing it to the vector. lVar1 is the stack canary value.

In this situations dont obfuscate with the vector pointer vec initialization at the begining, in this case the logic is quite clear.



The function save is a bit more tricky, but it's no more than a vector iteration and ofs writing.
Looping a simple "for (auto s : *vec)" in the decompiler is quite dense, but we can see clearly two write, the second write DAT_0010400b is a "\n"



As we see, save implememtation is quite straightforward.




Related articles
  1. Hacking Tools Github
  2. Hacker Tools Mac
  3. Pentest Tools List
  4. What Are Hacking Tools
  5. Hak5 Tools
  6. Hacker Tools Apk
  7. Physical Pentest Tools
  8. Hacking Tools Name
  9. Hacking Tools Mac
  10. Pentest Tools Subdomain
  11. Pentest Recon Tools
  12. How To Install Pentest Tools In Ubuntu
  13. Hacking Tools For Games
  14. Wifi Hacker Tools For Windows
  15. Hacker Tools Free
  16. Game Hacking
  17. Hack Tools For Mac
  18. Physical Pentest Tools
  19. Hacker
  20. Ethical Hacker Tools
  21. Hacker
  22. Hacking Tools Kit
  23. Top Pentest Tools
  24. Hacking Tools 2020
  25. Game Hacking
  26. Pentest Tools Website Vulnerability
  27. Termux Hacking Tools 2019
  28. Hackrf Tools
  29. Pentest Tools For Mac
  30. Tools For Hacker
  31. Hacking Tools 2019
  32. Hacking Tools Software
  33. Best Hacking Tools 2020
  34. Hacking Tools For Games
  35. Hacker Tools Apk Download
  36. Pentest Tools For Mac
  37. What Are Hacking Tools
  38. Wifi Hacker Tools For Windows
  39. Hacker Tool Kit
  40. Hacking Tools
  41. Hacker Tools Free
  42. Beginner Hacker Tools
  43. Hacking Tools For Windows 7
  44. Hack Tools For Ubuntu
  45. Hack Tools For Windows
  46. Hack App
  47. Hacker Tool Kit
  48. Pentest Tools Port Scanner
  49. Pentest Tools Website Vulnerability
  50. Hack Tools For Games
  51. Nsa Hacker Tools
  52. Hacking Tools For Windows
  53. Hacker Tools For Ios

No comments: