Friday, August 21, 2020

Reversing Some C++ Io Operations

In general decompilers are not friendly with c++ let's analyse a simple program to get familiar with it.
Let's implement a simple code that loads a file into a vector and then save the vector with following functions:

  • err
  • load
  • save
  • main


Lets identify the typical way in C++ to print to stdout with the operator "<<"


The basic_ostream is initialized writing the word "error" to the cout, and then the operator<< again to add the endl.




The Main function simply calls  "vec = load(filename)"  but the compiler modified it and passed the vector pointer as a parĂ¡meter. Then it bulds and prints "loaded  " << size << " users".
And finally saves the vector to /tmp/pwd and print "saved".
Most of the mess is basically the operator "<<" to concat and print values.
Also note that the vectors and strings are automatically deallocated when exit the function.


And here is the code:


Let's take a look to the load function, which iterates the ifs.getline() and push to the vector.
First of all there is a mess on the function definition, __return_storage_ptr is the vector.
the ifstream object ifs is initialized as a basic_ifstream and then operator! checks if it wasn't possible to open the file and in that case calls err()
We see the memset and a loop, getline read a cstr like line from the file, and then is converted to a string before pushing it to the vector. lVar1 is the stack canary value.

In this situations dont obfuscate with the vector pointer vec initialization at the begining, in this case the logic is quite clear.



The function save is a bit more tricky, but it's no more than a vector iteration and ofs writing.
Looping a simple "for (auto s : *vec)" in the decompiler is quite dense, but we can see clearly two write, the second write DAT_0010400b is a "\n"



As we see, save implememtation is quite straightforward.




More information
  1. Hacker Tools Apk
  2. Hak5 Tools
  3. Growth Hacker Tools
  4. Growth Hacker Tools
  5. Hacking Apps
  6. Hack Website Online Tool
  7. Pentest Tools Android
  8. Wifi Hacker Tools For Windows
  9. Nsa Hack Tools Download
  10. What Are Hacking Tools
  11. Hacking Tools Kit
  12. Pentest Tools Website Vulnerability
  13. Hacking Tools Windows 10
  14. Hacking Tools For Kali Linux
  15. Pentest Tools Download
  16. Hack Tools Mac
  17. Usb Pentest Tools
  18. Hack Tools Online
  19. Hacking Tools 2019
  20. Hacking Tools For Kali Linux
  21. Hacker Tools Github
  22. Hacker Tools Linux
  23. Hacking Tools
  24. What Is Hacking Tools
  25. Hacking Tools Kit
  26. Hacking Apps
  27. Pentest Tools
  28. Underground Hacker Sites
  29. Usb Pentest Tools
  30. Hack Website Online Tool
  31. Hacking Tools Windows
  32. Hacking Tools For Mac
  33. Hack Tools For Ubuntu
  34. Hacking Tools Name
  35. What Is Hacking Tools
  36. Github Hacking Tools
  37. Hacker
  38. Hacker Hardware Tools
  39. Hak5 Tools
  40. How To Install Pentest Tools In Ubuntu
  41. Hacking App
  42. Hacker
  43. Best Hacking Tools 2020
  44. Hacker Tools Github
  45. Tools Used For Hacking
  46. Hacker Tools For Mac
  47. Hacker Tools List
  48. Pentest Tools Review
  49. Best Hacking Tools 2019
  50. Hacker Tools Mac
  51. Pentest Tools Find Subdomains
  52. Pentest Tools Website Vulnerability
  53. Hack And Tools
  54. Pentest Tools Windows
  55. Pentest Tools Port Scanner
  56. Pentest Tools Open Source
  57. Pentest Tools Find Subdomains
  58. Hacking Tools Online
  59. Install Pentest Tools Ubuntu
  60. Pentest Tools Bluekeep
  61. Hak5 Tools
  62. Install Pentest Tools Ubuntu
  63. Hacker Tools Free
  64. Hacking Tools Github
  65. Hacker Tool Kit
  66. Hacker Tool Kit
  67. Pentest Tools List
  68. Hack Tools Github
  69. Pentest Tools Android
  70. Hack Tools 2019
  71. Easy Hack Tools
  72. Hacker Tools
  73. Hack Tools Download
  74. Pentest Tools Kali Linux
  75. Pentest Tools For Windows
  76. Pentest Tools List
  77. Hacking App
  78. Hacking Tools Mac
  79. Best Hacking Tools 2019
  80. Hacker

No comments: