Flag: Tornado! Hurricane!

 Forums >>  Debuggers  >>  Trace value from file in program

Topic created on: September 30, 2013 10:49 CDT by djnemo .

Hi,
Recently im start to do reverse a patch from a media file format that make the software crash!
I got the patch, diff against unpatched version found vulnerable version and then try to find calls to that function to find exactly which function are calling until my vulnerable function,So far so good.

But now i cannot find any of my media file(wmv) values in my player software in non of those functions(to change those values and try to trigger the bug)!

Anyone here have any experience in How i can find values in memory that exist in file too or which value from my file entering the software and ending where ?
Is there any other procedure to follow ?

Thanks

No posts found under this topic.
Note: Registration is required to post to the forums.

There are 31,327 total registered users.


Recently Created Topics
what\'s the big idea...
Nov/13
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23


Recent Forum Posts
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
let 'IDAPython' impo...
bytecod3r
Reverse Engineering ...
bytecod3r
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit