📚 OpenRCE is preserved as a read-only archive. Launched at RECon Montreal in 2005. Registration and posting are disabled.








Flag: Tornado! Hurricane!

Blogs >> EliCZ's Blog

Created: Friday, June 9 2006 04:00.40 CDT  
Printer Friendly ...
Matt Pietrek's x64 Primer article
Author: EliCZ # Views: 2855

http://msdn.microsoft.com/msdnmag/issues/06/05/x64/default.aspx

Ok, Matt fixed sizeof(HANDLE) but there are another small mistakes (I didn't read the whole article):

"

00401000: CALL DWORD PTR [00020000h]

In 64-bit mode, the same opcodebytes call the 64-bit pointer value stored at address 00421000h (4010000h + 20000h).
"

In 64-bit mode is it (FF 15 00 00 02 00):

00401000: CALL QWORD PTR [RIP +00020000h]
00401006:

Where RIP is RIP for the _following_ instruction, so a pointer value stored at (401000h + LengthOfCurrentInstruction + 20000h) will be called.

"Unlike in Win32, system DLLs don't have a default load address near the top of the user mode address range."

And what's the top of the user mode address range in x64? If it is SYSTEM_INFO.lpMaximumApplicationAddress then they _have_ a default load address near the top of the user mode address range.

"Instead, they're loaded above 4GB, typically at addresses around 0x7FF00000000."

Yep, "around 0x7FF00000000" is near the top of the user mode address range. Well, the "echt" system dlls (ntdll, wow64*, kernel32, user32) are still loaded below 2GB.




Add New Comment
Comment:









There are 31,328 total registered users.


Recently Created Topics
[help] Unpacking VMP...
Mar/12
Reverse Engineering ...
Jul/06
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06
Question about memor...
Dec/12


Recent Forum Posts
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow
let 'IDAPython' impo...
sohlow
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit