<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>Immunity Debugger v1.4</title>
                            <pubDate>Mon, 04 Feb 2008 12:27:14 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1042/Immunity_Debugger_v1.4</link>
                                        <author>nicowow &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Immunity is proud to announce: Immunity Debugger v1.4 &amp;quot;veni, vidi, pwn&amp;quot;&lt;br /&gt;
&lt;br /&gt;
We would like to express our appreciation for the enormous amount of&lt;br /&gt;
contributions, feedback and requests we receive daily from the Immunity&lt;br /&gt;
Debugger community at http://forum.immunityinc.com.&lt;br /&gt;
&lt;br /&gt;
Our TODO list seems infinite but we are getting the most requested&lt;br /&gt;
features out there for you guys.&lt;br /&gt;
&lt;br /&gt;
New in this release: a proper process detach, a Second Pass Analysis&lt;br /&gt;
which will soon grow into better argument/local variable recognitions&lt;br /&gt;
and a new Silent Mode for batch scripts.&lt;br /&gt;
&lt;br /&gt;
Last but not least, we have included a collection of new scripts&lt;br /&gt;
including a lot of contributions from forum regular Bob (scanpe.py,&lt;br /&gt;
hidedebug.py and bpxep.py) and the contest winning plugin from JMS&lt;br /&gt;
(Instead of a candle dinner with Kostya, he received a brand new job as&lt;br /&gt;
a Developer on the CANVAS team).&lt;br /&gt;
&lt;br /&gt;
Thanks for using Immunity Debugger! We hope you enjoy this month's&lt;br /&gt;
release, Check out the Changelog below for more detailed information.&lt;br /&gt;
&lt;br /&gt;
You can upgrade your current Immunity Debugger by going to Help/Update&lt;br /&gt;
or directly downloading the new installer from&lt;br /&gt;
http://debugger.immunityinc.com/register.html&lt;br /&gt;
&lt;br /&gt;
Sincerely&lt;br /&gt;
Team Immunity&lt;br /&gt;
http://www.immunityinc.com&lt;br /&gt;
&lt;br /&gt;
PS: Feedback, Requests, Scripts and Cool Screenshots are always&lt;br /&gt;
welcome at http://forum.immunityinc.com&lt;br /&gt;
&lt;br /&gt;
1.40 Build 0&lt;br /&gt;
&lt;br /&gt;
New Features:&lt;br /&gt;
&lt;br /&gt;
- Debugger Core:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Added Silent Debugging Flag [accesible via Debugging options ALT-O or via immlib]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;http://forum.immunityinc.com/index.php?topic=157.0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Added Analysis Second Pass [Decoding Functions]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;http://forum.immunityinc.com/index.php?topic=163.0&lt;br /&gt;
&lt;br /&gt;
- Debugger GUI Core:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Now you can add headers + other useful information on every Row&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;displayed at the Disasm Window. The information will be saved&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;as part of dump struct.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Dettach option added to File Menu: Go to File -&amp;gt; Dettach [You need to be attached to&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;gray out Dettach]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;http://forum.immunityinc.com/index.php?topic=158.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Debugger GUI:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Right click on disasm line -&amp;gt; Add Header will add headers to your line&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Immunity Debugger API:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Row Headers / Adding Lines to CPU&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Added imm.addHeader() and imm.getHeader() methods.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- imm.addLine behaves like addHeader()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Added imm.removeHeader()/imm.removeLine() &amp;amp;&amp;amp; imm.getHeader()/imm.getLine()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Added imm.getTraceArgs()&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Added imm.goSilent() method.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Added imm.undecorateName() method: Undecorate symbol names&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;http://forum.immunityinc.com/index.php?topic=159.0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Added imm.Dettach() method: Dettach current process from debugger&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Added imm.prepareForNewProcess() method: Prepare Debugger core for a fresh start&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Updated BoB's UserDB.txt (http://peid.info/BobSoft/Downloads.html)&lt;br /&gt;
&lt;br /&gt;
- PyCommands:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Added namefunc.py : a simple samplescript that uses imm.addHeader to name&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;functions in module&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Added traceargs.py: find User supplied arguments into a given function.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o Added JMS's Mike &amp;amp; Boo script&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o User Contributed PyCommands:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - BoB (http://PEiD.info/BobSoft/)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * scanpe.py (http://forum.immunityinc.com/index.php?topic=137.0)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * hidedebug.py (http://forum.immunityinc.com/index.php?topic=140.0)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * bpxep.py (http://forum.immunityinc.com/index.php?topic=138.0)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bug Fixes:&lt;br /&gt;
&lt;br /&gt;
- Fixed error when adding knowledge and changing python enviroments later.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;(__dict__ not accesible in restricted mode error)&lt;br /&gt;
</description>
                    </item>
                <item>
            <title>Vista Heap, Controlling the Determinism.</title>
                            <pubDate>Tue, 23 Oct 2007 19:04:34 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/919/Vista_Heap,_Controlling_the_Determinism.</link>
                                        <author>nicowow &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Sometimes, I believe Microsoft made it easy for us with the introduction of the default Low Fragmentation Heap on Vista. You can probably tell me 'yeah, but unlink is dead'. The Unlink Write4 was already dead long time ago, when ASLR came out and we dont have much to write.&lt;br /&gt;
&lt;br /&gt;
Part of what we said on our Advance heap overflow trainning is that heap overflow are not about the unlink write4, but about controlling the determinism. This is gonna be part of my PacSec talk, Exploiting is far from&amp;nbsp;&amp;nbsp;just sending a string with a what and a where, It's about a methodology that includes&amp;nbsp;&amp;nbsp;a complete understanding of the allocation algorythm, different step that in the life of heap overflow and their layout and a deep as it can understanding of the server you are exploiting (At least, based on their allocation/deallocation patterns).&lt;br /&gt;
&lt;br /&gt;
The objective now is&amp;nbsp;&amp;nbsp;aiming into the data (No matter how cool technique might came out for tricking the Vista algo).&lt;br /&gt;
Anyways, continuing with my statement, the Low Fragmentation Heap makes our life somehow easy to predict what we are overwriting either for small or a bigger application, since it allocates a big bucket of chunks of the same size all together.&lt;br /&gt;
&lt;br /&gt;
(Now its a good time for checking the attached ScreenShot and see how a bucket looks like and how ID can tell you exactly the order where those chunks would be taken out when a chunk of that size is requested.)&lt;br /&gt;
&lt;br /&gt;
So, if we have a Function Pointers, some structure and even a String we want to overwrite, apart of the usual magic we need to craft the 'overwriting' chunk as the same size of what we target. After that we would have everything on a 'small universe' where we can probably predict nicely.&lt;br /&gt;
&lt;br /&gt;
PS: With the 'usual magic', I meant the usual holes filling, etc.&lt;br /&gt;
PS2: The screenshot can be found here:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;http://forum.immunityinc.com/index.php?topic=99.0&lt;br /&gt;
</description>
                    </item>
                <item>
            <title>For those who miss it: Immunity Debugger v1.2 Release</title>
                            <pubDate>Mon, 08 Oct 2007 12:02:14 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/911/For_those_who_miss_it:_Immunity_Debugger_v1.2_Release</link>
                                        <author>nicowow &lt;email-suppressed@example.com&gt;</author>
                                                    <description>This release we include a flurry of new exciting features!&lt;br /&gt;
&lt;br /&gt;
 We are proud to announce the first beta version of our free&lt;br /&gt;
Vista Heap Library, which supports the new 'Freelist' and&lt;br /&gt;
Low Fragmentation Chunk.&amp;nbsp;&amp;nbsp;Check out the new usage of the&lt;br /&gt;
!heap command for more details.&lt;br /&gt;
&lt;br /&gt;
 Also included in this release the new recognition library using&lt;br /&gt;
heuristic patterns, with a huge database of known windows static&lt;br /&gt;
functions. Immunity Debugger includes this library both as a&lt;br /&gt;
PyCommand (use !recognize) and as a function for scripting&lt;br /&gt;
(use searchFunctionByHeuristic).&lt;br /&gt;
&lt;br /&gt;
As an example usage, imagine you want to release your own script&lt;br /&gt;
and set a breakpoint on a unnamed function which might move or&lt;br /&gt;
change slightly across different versions of the program. Using&lt;br /&gt;
Immunity Debugger's API you can get the heuristic out of the&lt;br /&gt;
function and do:&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
&lt;br /&gt;
 address = imm.searchFunctionByHeuristic( heuristic)&lt;br /&gt;
 imm.setBreakpoint( address )&lt;br /&gt;
&lt;br /&gt;
Finally, we include our own small version of peid called&lt;br /&gt;
!findpacker using Ero Carrera's pefile and Bob's UserDB with&lt;br /&gt;
around 1300 signatures for packers, cryptors and other loaders.&lt;br /&gt;
&lt;br /&gt;
 Immunity is also moving the deadline for the PyCommands contest&lt;br /&gt;
to the 10th of December to give you more time to use the new features.&lt;br /&gt;
&lt;br /&gt;
 Thanks for using Immunity Debugger! We hope you enjoy this month's&lt;br /&gt;
release. You+can upgrade your current Immunity Debugger by going to&lt;br /&gt;
Help/Update or by directly downloading the new installer from&lt;br /&gt;
http://debugger.immunityinc.com/register.html&lt;br /&gt;
&lt;br /&gt;
Don't forget to check out the Immunity Forum (http://forum.immunityinc.com)&lt;br /&gt;
for more examples, feedback, cool screenshots, etc.&lt;br /&gt;
&lt;br /&gt;
Thanks&lt;br /&gt;
Immunity Debugger Team&lt;br /&gt;
&lt;br /&gt;
1.20 Build 0&lt;br /&gt;
October 1, 2007&lt;br /&gt;
&lt;br /&gt;
New Features:&lt;br /&gt;
&lt;br /&gt;
- Immunity Debugger API&lt;br /&gt;
&amp;nbsp;&amp;nbsp;o immlib.getThreadId() method added: return the current debuggee thread id&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o immlib.getCallTree() method added: return the call tree for given&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;address&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o immlib.setFocus() method added: focus ID window&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o immlib.isValidHandle() method added: check if a HWND is still valid&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o immlib.getInfoPanel() method added: get information from panel window&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;and optionally receives a type flag to force the kind of comment&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;fetched.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o imm.findPacker() method added: find packers/cryptors on a file or a&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;loaded module&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o imm.getMemoryPagebyOwner(): Find all the memory pages belonging to a&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;module.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o immlib.ps() returns two extra objects: the tcp list and the udp list&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o immlib.getComment() now will try to fetch all types of comments&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o Added new HOOKTYPE: PRE_BP_HOOK, hooks exactly before the breakpoint&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;is hit (Decoding events timeline)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o New Vista support for libheap&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o Custom Tables has &amp;quot;Clear Window&amp;quot; menu now&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o Added several methods from librecognize&lt;br /&gt;
&lt;br /&gt;
- PyCommands&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o findpacker added. (Use of findPacker to get Packers from a module)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o recognize added. (Function Recognizing using heuristic patterns)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o Hippie now can filter by heap&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o heap updated to work with new Vista Heap&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o Optimized code for stackvars (Memory usage reduction during runtime)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Core&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o Pyshell can be focused once created with alt-F11&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o Shortcut for attach process added: Ctrl+F1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o Added librecognition.py (Library for function recognizing)&lt;br /&gt;
- Graph&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o immvcglib.generateGraphFromBuf() method added: play with your own vcg&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;files!&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;o Redesign of VCG parser: easier to read, easier to use.&lt;br /&gt;
&lt;br /&gt;
Bug Fixes:&lt;br /&gt;
&lt;br /&gt;
o Return value (HWND) of createTable&lt;br /&gt;
o Fixed Attach Search Filtering :&lt;br /&gt;
&amp;nbsp;&amp;nbsp;http://forum.immunityinc.com/index.php?topic=49.0&lt;br /&gt;
o Grapher: Vertex lastline jumps correctly displayed now&lt;br /&gt;
o Fixed crash when searching on modules:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;http://forum.immunityinc.com/index.php?topic=63.0&lt;br /&gt;
o Fixed search issue on protected binary:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;http://forum.immunityinc.com/index.php?topic=34&lt;br /&gt;
o Fixed breakpoint/logpoint hooks issue (logic/stepping inside a hook)&lt;br /&gt;
o Fixed PyString_AsString() missbehaviour&lt;br /&gt;
o Fixed PyCommand Gui Arguments box to receive \x00 as argument&lt;br /&gt;
o Fixed imm.getModulebyAddress() to receive any module address and not only&lt;br /&gt;
&amp;nbsp;&amp;nbsp;module entry point&lt;br /&gt;
&amp;nbsp;&amp;nbsp;http://forum.immunityinc.com/index.php?topic=74.0&lt;br /&gt;
</description>
                    </item>
                <item>
            <title>Immunity Debugger v1.1 Release</title>
                            <pubDate>Thu, 30 Aug 2007 16:09:20 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/882/Immunity_Debugger_v1.1_Release</link>
                                        <author>nicowow &lt;email-suppressed@example.com&gt;</author>
                                                    <description> The number one request this month was &amp;quot;Please implement a Python shell so I can write scripts and play with immlib features on the fly!&amp;quot;. This is now done. Enjoy! Next to that we continued our efforts to improve the overall debugging experience with two new libraries, libstackanalyze and Ero's Carrera pefile and two new scripts: searchcrypt and stackvar.&amp;nbsp;&amp;nbsp; The Immunity Debugger engine has also undergone changes to improve reliability issues, fix reported memleaks and remove some well-know bugs used for packers such as the printfloat format error (a.k.a the FLD bug).&amp;nbsp;&amp;nbsp; Keep in mind we still have a contest going for the best Immunity Debugger script. The winner gets a free SILICA! Get more details from &lt;a href=&quot;http://forum.immunityinc.com/index.php?topic=12.0&quot;&gt;http://forum.immunityinc.com/index.php?topic=12.0&lt;/a&gt; . &lt;br /&gt;
 We hope you enjoy this month's release. You can upgrade your current Immunity Debugger by going to Help/Update or directly downloading from &lt;a href=&quot;http://debugger.immunityinc.com/register.html&quot;&gt;http://debugger.immunityinc.com/register.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
 Feedback, Requests, and Cool Screenshots&amp;nbsp;&amp;nbsp;are always welcomed at &lt;a href=&quot;http://forum.immunityinc.com&quot;&gt;http://forum.immunityinc.com&lt;/a&gt; &lt;br /&gt;
Sincerely,&lt;br /&gt;
Team Immunity&lt;br /&gt;
&lt;a href=&quot;http://www.immunityinc.com&quot;&gt;http://www.immunityinc.com&lt;/a&gt;&lt;br /&gt;
PS: If you are a company, and you are looking for a person&lt;br /&gt;
with the right&amp;nbsp;&amp;nbsp;skills, try our ID Job Advertisement program: &lt;a href=&quot;http://www.immunityinc.com/products-idadvertising.shtml&quot;&gt;http://www.immunityinc.com/products-idadvertising.shtml&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
-------------------------------&lt;br /&gt;
1.1 Build 0&lt;br /&gt;
August 30, 2007&lt;br /&gt;
&lt;br /&gt;
New Features:&lt;br /&gt;
&lt;br /&gt;
o Interactive Python Shell added&lt;br /&gt;
o Lookaside enhanced output + Discovery option&lt;br /&gt;
o libdatatype &amp;quot;Get&amp;quot; Function&lt;br /&gt;
o Get OS information methods&lt;br /&gt;
o Ero Carrera's pefile.py (http://code.google.com/p/pefile/)&lt;br /&gt;
o Python engine rewritten to properly use thread locking/unlocking&lt;br /&gt;
o Added ignoreSingleStep method for immlib (TRANSPARENT + CONVENTIONAL)&lt;br /&gt;
o Attach process window is now dynamically searchable&lt;br /&gt;
o Added clean ID memory methods inside immlib&lt;br /&gt;
o Added Stack analyzation library (libstackanalyze)&lt;br /&gt;
o Fixed some memleak on Disasm&lt;br /&gt;
o Fixed wrong arguments on Disasm operand&lt;br /&gt;
o Improved Patch command&lt;br /&gt;
o Safeseh moved into a PyCommand&lt;br /&gt;
&lt;br /&gt;
New Scripts:&lt;br /&gt;
&lt;br /&gt;
o searchcrypt PyCommand&lt;br /&gt;
o stackvars PyCommand&lt;br /&gt;
&lt;br /&gt;
Bug Fixes:&lt;br /&gt;
&lt;br /&gt;
o Solved 'ij' issue inside attach window&lt;br /&gt;
o Fixed VCG parser (Blocks display complete address now)&lt;br /&gt;
o Fixed traceback error when trying to graph and not attached&lt;br /&gt;
o Fixed printfloat() format error&lt;br /&gt;
o Fixed ret value of Getaddrfromexp in case of non-existing expression&lt;br /&gt;
</description>
                    </item>
                <item>
            <title>Immunity Debugger Plugin Awards</title>
                            <pubDate>Wed, 15 Aug 2007 14:38:18 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/857/Immunity_Debugger_Plugin_Awards</link>
                                        <author>nicowow &lt;email-suppressed@example.com&gt;</author>
                                                    <description>&lt;br /&gt;
&lt;br /&gt;
The Why&lt;br /&gt;
To celebrate the official release of the Immunity Debugger we are having an Immunity Debugger plugin contest. The Immunity Debugger is a full featured Win32 debugger aimed at streamlining VulnDev and Reverse Engineering work.&lt;br /&gt;
&lt;br /&gt;
You can read all about it at http://www.immunityinc.com/products-immdbg.shtml.&lt;br /&gt;
&lt;br /&gt;
Immunity Debugger is available to the community for free! The fully integrated Python scripting engine means you are able to rapidly develop highly flexible debugger plugins. The entire debugger API, the GUI and the graphing engine are available from this pure Python environment.&lt;br /&gt;
&lt;br /&gt;
Immunity Debugger comes with a set of example plugins, but those only scratch the surface of what you can do with the engine. So to get the creative juices flowing, Immunity has organized an ID plugin writing contest for and by the people.&lt;br /&gt;
&lt;br /&gt;
Yah, we're socialist like that.&lt;br /&gt;
&lt;br /&gt;
The What&lt;br /&gt;
&lt;br /&gt;
First prize will consist of either a candle lit dinner with Kostya, or a Immunity SILICA unit. You pick.&lt;br /&gt;
&lt;br /&gt;
Second prize will consist of maybe a blender. But we have a really bad track record for sending those out. So you should probably go for first place.&lt;br /&gt;
&lt;br /&gt;
The How&lt;br /&gt;
&lt;br /&gt;
Plugins need to be written in Python using the Immunity Debugger API. If any part of your plugin is not written in Python, you will have to provide full sourcecode access.&lt;br /&gt;
&lt;br /&gt;
Plugins will be scored by means of a voting process. Winners and not-winners-but-still-really-cool will be listed on the Immunity website.&lt;br /&gt;
&lt;br /&gt;
The criteria are as follows:&lt;br /&gt;
&lt;br /&gt;
o Original Content&lt;br /&gt;
o Novelty of the Research involved&lt;br /&gt;
o Overall Coolness&lt;br /&gt;
&lt;br /&gt;
Judges:&lt;br /&gt;
&lt;br /&gt;
- Damian Gomez&lt;br /&gt;
- Dave Aitel&lt;br /&gt;
- Halvar Flake&lt;br /&gt;
- Pedram Amini&lt;br /&gt;
- Sinan Eren&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The When&lt;br /&gt;
&lt;br /&gt;
Right now! The submission deadline is 11:59PM on October 10th 2007. You can submit your plugins to: immunitydebugger ( at ) immunityinc.com. We encourage you to post hashes of your plugins to FD.&lt;br /&gt;
&lt;br /&gt;
Legal Note&lt;br /&gt;
&lt;br /&gt;
All submitted entries need to be licensed under the modified (3-clause, aka non-attribution) BSD license to be considered for the prize.&lt;br /&gt;
By submitting your plugin, you grant Immunity Inc. the right to distribute, reproduce, and advertise your plugin. The winner of a SILICA unit will be subject to the terms of the SILICA license and will have to provide proof of identity. </description>
                    </item>
            </channel>
</rss>
