Wednesday, January 24, 2024

Reversing Some C++ Io Operations

In general decompilers are not friendly with c++ let's analyse a simple program to get familiar with it.
Let's implement a simple code that loads a file into a vector and then save the vector with following functions:

  • err
  • load
  • save
  • main


Lets identify the typical way in C++ to print to stdout with the operator "<<"


The basic_ostream is initialized writing the word "error" to the cout, and then the operator<< again to add the endl.




The Main function simply calls  "vec = load(filename)"  but the compiler modified it and passed the vector pointer as a parΓ‘meter. Then it bulds and prints "loaded  " << size << " users".
And finally saves the vector to /tmp/pwd and print "saved".
Most of the mess is basically the operator "<<" to concat and print values.
Also note that the vectors and strings are automatically deallocated when exit the function.


And here is the code:


Let's take a look to the load function, which iterates the ifs.getline() and push to the vector.
First of all there is a mess on the function definition, __return_storage_ptr is the vector.
the ifstream object ifs is initialized as a basic_ifstream and then operator! checks if it wasn't possible to open the file and in that case calls err()
We see the memset and a loop, getline read a cstr like line from the file, and then is converted to a string before pushing it to the vector. lVar1 is the stack canary value.

In this situations dont obfuscate with the vector pointer vec initialization at the begining, in this case the logic is quite clear.



The function save is a bit more tricky, but it's no more than a vector iteration and ofs writing.
Looping a simple "for (auto s : *vec)" in the decompiler is quite dense, but we can see clearly two write, the second write DAT_0010400b is a "\n"



As we see, save implememtation is quite straightforward.




Related posts
  1. Pentest Tools Tcp Port Scanner
  2. Pentest Tools Bluekeep
  3. Hacker Tools Online
  4. Hacking Tools Online
  5. Hacker Tools For Windows
  6. Hacker Search Tools
  7. What Are Hacking Tools
  8. Hackrf Tools
  9. Top Pentest Tools
  10. Hackrf Tools
  11. Hacker Tools Software
  12. Pentest Tools Review
  13. Hacker Search Tools
  14. Hacker Tools
  15. Best Pentesting Tools 2018
  16. Hacking Tools For Windows 7
  17. Underground Hacker Sites
  18. Hacking Tools And Software
  19. Hacking Tools For Kali Linux
  20. Hackrf Tools
  21. Hacker Tools Software
  22. Hacker Tools For Mac
  23. Computer Hacker
  24. Hack Tools For Pc
  25. Hack Tools Online
  26. Bluetooth Hacking Tools Kali
  27. Pentest Reporting Tools
  28. Github Hacking Tools
  29. Tools For Hacker
  30. Pentest Tools Bluekeep
  31. Hacker Tools 2020
  32. Hacker Tools Online
  33. Underground Hacker Sites
  34. Android Hack Tools Github
  35. Hacking Tools
  36. Pentest Tools Windows
  37. Hacking Tools For Windows 7
  38. Nsa Hack Tools
  39. Hacker
  40. Pentest Tools Linux
  41. Hacking Tools 2019
  42. Tools For Hacker
  43. Hak5 Tools
  44. Free Pentest Tools For Windows
  45. Growth Hacker Tools
  46. Hacking Tools Free Download
  47. World No 1 Hacker Software
  48. Hacker Tools Mac
  49. Hacker Tool Kit
  50. Pentest Tools Website Vulnerability
  51. Beginner Hacker Tools
  52. Pentest Tools Android
  53. Hacking Tools For Mac
  54. Pentest Box Tools Download
  55. Underground Hacker Sites
  56. Hacking Tools
  57. Growth Hacker Tools
  58. Hacker Tools For Mac
  59. Pentest Tools Subdomain
  60. Hacking Tools Software
  61. Pentest Tools Github
  62. Best Hacking Tools 2020
  63. Hacker Tools
  64. Hack Tool Apk
  65. Hack Tools
  66. Pentest Tools Website

No comments:

Post a Comment