Here, I'll emphasize one thing that could stand to be better emphasized in Hex-Rays' own documentation: you have to be using the same version of WinDbg on each side. And I'll indicate some ways to isolate end-to-end (E2E) issues. Note that the system with IDA Pro on it is referred to here as the analysis system (it's where you do your analysis of the code), and the system where you run malware is referred to as the target system.
Pointers
- Resolve any end-to-end (E2E) issues first (firewalls, networking, etc.)
- Lock IDA Pro into using the same version of WinDbg as is on your target system
- Use WinDbg itself to verify that there are no E2E issues
Algorithm
This is exactly how to set up a remote debugging setup with IDA Pro and WinDbg. Here are the steps:
- Both systems: Ensure your analysis and target machines can access each other over the network
- If they are VMs, you may need to adjust them to ensure they are both host-only
- You might need to mess with firewall settings
- If you are using FakeNet-NG, you might need to add an exception for dbgsrv.exe
- Target system: Locate (install, if necessary) WinDbg on your target system.
- Target -> Analysis system: If you haven't installed the same version of WinDbg to both systems, then simply copy the entire x86 directory where you located WinDbg on the target system, onto your analysis system. It doesn't matter where you place this.
- Analysis system: Edit ida.cfg to set DBGTOOLS to point to the x86 directory
- Use double backslashes, e.g. DBGTOOLS = "C:\\Program Files (x86)\\Windows Kits\\10\\Debuggers\\x86\\";
- Target system: Start the WinDbg debug server
- "C:\path\to\dbgsrv.exe" -t tcp:port=9999
- Analysis system: Test by trying to connect remotely with WinDbg itself - if this doesn't work, then you've got end-to-end issues to resolve before IDA will work
- Analysis system: configure your IDB to use WinDbg:
- Debugger -> Switch debugger... (select Windbg debugger and click OK)
- Debugger -> Options...
- Application: path\on\your\target\system\to\binary.exe
- Input file: path\on\your\target\system\to\binary.exe
- Directory: path\on\your\target\system\to
- Parameters: command-line arguments you want passed to the malware (if any)
- Connection string: tcp:server=TARGETSYSTEMNAME,port=9999
- Click OK
- Analysis system: Click on an instruction and hit F4 to "run to" that instruction, or set a breakpoint and strike F9
- Disregard warnings as applicable ;-)
Troubleshooting
You may want to audit your user and system PATH environment variables to ensure that they don't include the x86 directory of a conflicting version of WinDbg, or the x64 directory for that matter.
If you get "Could not initialize WinDbg engine 0x7f / The specified procedure could not be found... You might try adding the path to that x86 directory to your system path and closing/reopening IDA. I also find that certain Python scripts seem to cause IDA Pro to emit this error, so you might also try closing/reopening IDA, initiating your debug session, and only THEN loading any ancillary IDAPython scripts you were using.
Miscellany
As of 2011, Hex-Rays indicated that this would not work with the x64 tools.
mmorpg oyunlar
ReplyDeleteinstagram takipçi satın al
tiktok jeton hilesi
tiktok jeton hilesi
Saç ekimi antalya
referans kimliği nedir
İNSTAGRAM TAKİPÇİ SATIN AL
Metin2 pvp serverlar
İNSTAGRAM TAKİPCİ SATIN AL
Smm panel
ReplyDeleteSmm Panel
iş ilanları
instagram takipçi satın al
hirdavatciburada.com
Www.beyazesyateknikservisi.com.tr
servis
Tiktok jeton hilesi
uc satın al
ReplyDeleteen son çıkan perde modelleri
özel ambulans
yurtdışı kargo
lisans satın al
minecraft premium
nft nasıl alınır
en son çıkan perde modelleri