2015-08-21 07:04:50 +00:00
|
|
|
#!/usr/bin/env python
|
|
|
|
# Sample code for X86 of Unicorn. Nguyen Anh Quynh <aquynh@gmail.com>
|
|
|
|
|
|
|
|
from __future__ import print_function
|
|
|
|
from unicorn import *
|
|
|
|
from unicorn.x86_const import *
|
|
|
|
|
|
|
|
|
|
|
|
X86_CODE32 = b"\x41\x4a" # INC ecx; DEC dex
|
|
|
|
X86_CODE32_LOOP = b"\x41\x4a\xeb\xfe" # INC ecx; DEC dex; JMP self-loop
|
|
|
|
X86_CODE32_MEM_READ = b"\x8B\x0D\xAA\xAA\xAA\xAA\x41\x4a" # mov ecx,[0xaaaaaaaa]; INC ecx; DEC dex
|
|
|
|
X86_CODE32_MEM_WRITE = b"\x89\x0D\xAA\xAA\xAA\xAA\x41\x4a" # mov [0xaaaaaaaa], ecx; INC ecx; dec edx
|
|
|
|
X86_CODE64 = b"\x41\xBC\x3B\xB0\x28\x2A\x49\x0F\xC9\x90\x4D\x0F\xAD\xCF\x49\x87\xFD\x90\x48\x81\xD2\x8A\xCE\x77\x35\x48\xF7\xD9\x4D\x29\xF4\x49\x81\xC9\xF6\x8A\xC6\x53\x4D\x87\xED\x48\x0F\xAD\xD2\x49\xF7\xD4\x48\xF7\xE1\x4D\x19\xC5\x4D\x89\xC5\x48\xF7\xD6\x41\xB8\x4F\x8D\x6B\x59\x4D\x87\xD0\x68\x6A\x1E\x09\x3C\x59"
|
|
|
|
X86_CODE32_INOUT = b"\x41\xE4\x3F\x4a\xE6\x46\x43" # INC ecx; IN AL, 0x3f; DEC edx; OUT 0x46, AL; INC ebx
|
2015-08-22 01:02:26 +00:00
|
|
|
X86_CODE64_SYSCALL = '\x0f\x05' # SYSCALL
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
# memory address where emulation starts
|
|
|
|
ADDRESS = 0x1000000
|
|
|
|
|
|
|
|
|
|
|
|
# callback for tracing basic blocks
|
|
|
|
def hook_block(uc, address, size, user_data):
|
|
|
|
print(">>> Tracing basic block at 0x%x, block size = 0x%x" %(address, size))
|
|
|
|
|
|
|
|
|
|
|
|
# callback for tracing instructions
|
|
|
|
def hook_code(uc, address, size, user_data):
|
|
|
|
print(">>> Tracing instruction at 0x%x, instruction size = %u" %(address, size))
|
2015-08-24 04:36:33 +00:00
|
|
|
#eip = uc.reg_read(UC_X86_REG_EIP)
|
2015-08-21 07:04:50 +00:00
|
|
|
#print(">>> EIP = 0x%x" %(eip))
|
|
|
|
|
|
|
|
|
|
|
|
# callback for tracing invalid memory access (READ or WRITE)
|
|
|
|
def hook_mem_invalid(uc, access, address, size, value, user_data):
|
|
|
|
if access == UC_MEM_WRITE:
|
|
|
|
print(">>> Missing memory is being WRITE at 0x%x, data size = %u, data value = 0x%x" \
|
|
|
|
%(address, size, value))
|
|
|
|
# map this memory in with 2MB in size
|
|
|
|
uc.mem_map(0xaaaa0000, 2 * 1024*1024)
|
|
|
|
# return True to indicate we want to continue emulation
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
# return False to indicate we want to stop emulation
|
|
|
|
return False
|
|
|
|
|
|
|
|
|
|
|
|
# callback for tracing memory access (READ or WRITE)
|
|
|
|
def hook_mem_access(uc, access, address, size, value, user_data):
|
|
|
|
if access == UC_MEM_WRITE:
|
|
|
|
print(">>> Memory is being WRITE at 0x%x, data size = %u, data value = 0x%x" \
|
|
|
|
%(address, size, value))
|
|
|
|
else: # READ
|
|
|
|
print(">>> Memory is being READ at 0x%x, data size = %u" \
|
|
|
|
%(address, size))
|
|
|
|
|
|
|
|
|
|
|
|
# callback for IN instruction
|
|
|
|
def hook_in(uc, port, size, user_data):
|
2015-08-24 04:36:33 +00:00
|
|
|
eip = uc.reg_read(UC_X86_REG_EIP)
|
2015-08-21 07:04:50 +00:00
|
|
|
print("--- reading from port 0x%x, size: %u, address: 0x%x" %(port, size, eip))
|
|
|
|
if size == 1:
|
|
|
|
# read 1 byte to AL
|
|
|
|
return 0xf1
|
|
|
|
if size == 2:
|
|
|
|
# read 2 byte to AX
|
|
|
|
return 0xf2
|
|
|
|
if size == 4:
|
|
|
|
# read 4 byte to EAX
|
|
|
|
return 0xf4
|
|
|
|
# we should never reach here
|
|
|
|
return 0
|
|
|
|
|
|
|
|
|
|
|
|
# callback for OUT instruction
|
|
|
|
def hook_out(uc, port, size, value, user_data):
|
2015-08-24 04:36:33 +00:00
|
|
|
eip = uc.reg_read(UC_X86_REG_EIP)
|
2015-08-21 07:04:50 +00:00
|
|
|
print("--- writing to port 0x%x, size: %u, value: 0x%x, address: 0x%x" %(port, size, value, eip))
|
|
|
|
|
|
|
|
# confirm that value is indeed the value of AL/AX/EAX
|
|
|
|
v = 0
|
|
|
|
if size == 1:
|
|
|
|
# read 1 byte in AL
|
2015-08-24 04:36:33 +00:00
|
|
|
v = uc.reg_read(UC_X86_REG_AL)
|
2015-08-21 07:04:50 +00:00
|
|
|
if size == 2:
|
|
|
|
# read 2 bytes in AX
|
2015-08-24 04:36:33 +00:00
|
|
|
v = uc.reg_read(UC_X86_REG_AX)
|
2015-08-21 07:04:50 +00:00
|
|
|
if size == 4:
|
|
|
|
# read 4 bytes in EAX
|
2015-08-24 04:36:33 +00:00
|
|
|
v = uc.reg_read(UC_X86_REG_EAX)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
print("--- register value = 0x%x" %v)
|
|
|
|
|
|
|
|
|
|
|
|
# Test X86 32 bit
|
|
|
|
def test_i386():
|
|
|
|
print("Emulate i386 code")
|
|
|
|
try:
|
|
|
|
# Initialize emulator in X86-32bit mode
|
|
|
|
mu = Uc(UC_ARCH_X86, UC_MODE_32)
|
|
|
|
|
|
|
|
# map 2MB memory for this emulation
|
|
|
|
mu.mem_map(ADDRESS, 2 * 1024 * 1024)
|
|
|
|
|
|
|
|
# write machine code to be emulated to memory
|
|
|
|
mu.mem_write(ADDRESS, X86_CODE32)
|
|
|
|
|
|
|
|
# initialize machine registers
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.reg_write(UC_X86_REG_ECX, 0x1234)
|
|
|
|
mu.reg_write(UC_X86_REG_EDX, 0x7890)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
# tracing all basic blocks with customized callback
|
|
|
|
mu.hook_add(UC_HOOK_BLOCK, hook_block)
|
|
|
|
|
|
|
|
# tracing all instructions with customized callback
|
|
|
|
mu.hook_add(UC_HOOK_CODE, hook_code)
|
|
|
|
|
|
|
|
# emulate machine code in infinite time
|
|
|
|
mu.emu_start(ADDRESS, ADDRESS + len(X86_CODE32))
|
|
|
|
|
|
|
|
# now print out some registers
|
|
|
|
print(">>> Emulation done. Below is the CPU context")
|
|
|
|
|
2015-08-24 04:36:33 +00:00
|
|
|
r_ecx = mu.reg_read(UC_X86_REG_ECX)
|
|
|
|
r_edx = mu.reg_read(UC_X86_REG_EDX)
|
2015-08-21 07:04:50 +00:00
|
|
|
print(">>> ECX = 0x%x" %r_ecx)
|
|
|
|
print(">>> EDX = 0x%x" %r_edx)
|
|
|
|
|
|
|
|
# read from memory
|
|
|
|
tmp = mu.mem_read(ADDRESS, 2)
|
|
|
|
print(">>> Read 2 bytes from [0x%x] =" %(ADDRESS), end="")
|
|
|
|
for i in tmp:
|
|
|
|
print(" 0x%x" %i, end="")
|
|
|
|
print("")
|
|
|
|
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
|
|
|
|
def test_i386_loop():
|
|
|
|
print("Emulate i386 code with infinite loop - wait for 2 seconds then stop emulation")
|
|
|
|
try:
|
|
|
|
# Initialize emulator in X86-32bit mode
|
|
|
|
mu = Uc(UC_ARCH_X86, UC_MODE_32)
|
|
|
|
|
|
|
|
# map 2MB memory for this emulation
|
|
|
|
mu.mem_map(ADDRESS, 2 * 1024 * 1024)
|
|
|
|
|
|
|
|
# write machine code to be emulated to memory
|
|
|
|
mu.mem_write(ADDRESS, X86_CODE32_LOOP)
|
|
|
|
|
|
|
|
# initialize machine registers
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.reg_write(UC_X86_REG_ECX, 0x1234)
|
|
|
|
mu.reg_write(UC_X86_REG_EDX, 0x7890)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
# emulate machine code in infinite time
|
|
|
|
mu.emu_start(ADDRESS, ADDRESS + len(X86_CODE32_LOOP), 2 * UC_SECOND_SCALE)
|
|
|
|
|
|
|
|
# now print out some registers
|
|
|
|
print(">>> Emulation done. Below is the CPU context")
|
|
|
|
|
2015-08-24 04:36:33 +00:00
|
|
|
r_ecx = mu.reg_read(UC_X86_REG_ECX)
|
|
|
|
r_edx = mu.reg_read(UC_X86_REG_EDX)
|
2015-08-21 07:04:50 +00:00
|
|
|
print(">>> ECX = 0x%x" %r_ecx)
|
|
|
|
print(">>> EDX = 0x%x" %r_edx)
|
|
|
|
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
|
|
|
|
def test_i386_invalid_mem_read():
|
|
|
|
print("Emulate i386 code that read from invalid memory")
|
|
|
|
try:
|
|
|
|
# Initialize emulator in X86-32bit mode
|
|
|
|
mu = Uc(UC_ARCH_X86, UC_MODE_32)
|
|
|
|
|
|
|
|
# map 2MB memory for this emulation
|
|
|
|
mu.mem_map(ADDRESS, 2 * 1024 * 1024)
|
|
|
|
|
|
|
|
# write machine code to be emulated to memory
|
|
|
|
mu.mem_write(ADDRESS, X86_CODE32_MEM_READ)
|
|
|
|
|
|
|
|
# initialize machine registers
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.reg_write(UC_X86_REG_ECX, 0x1234)
|
|
|
|
mu.reg_write(UC_X86_REG_EDX, 0x7890)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
# tracing all basic blocks with customized callback
|
|
|
|
mu.hook_add(UC_HOOK_BLOCK, hook_block)
|
|
|
|
|
|
|
|
# tracing all instructions with customized callback
|
|
|
|
mu.hook_add(UC_HOOK_CODE, hook_code)
|
|
|
|
|
|
|
|
try:
|
|
|
|
# emulate machine code in infinite time
|
|
|
|
mu.emu_start(ADDRESS, ADDRESS + len(X86_CODE32_MEM_READ))
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
# now print out some registers
|
|
|
|
print(">>> Emulation done. Below is the CPU context")
|
|
|
|
|
2015-08-24 04:36:33 +00:00
|
|
|
r_ecx = mu.reg_read(UC_X86_REG_ECX)
|
|
|
|
r_edx = mu.reg_read(UC_X86_REG_EDX)
|
2015-08-21 07:04:50 +00:00
|
|
|
print(">>> ECX = 0x%x" %r_ecx)
|
|
|
|
print(">>> EDX = 0x%x" %r_edx)
|
|
|
|
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
|
|
|
|
def test_i386_invalid_mem_write():
|
|
|
|
print("Emulate i386 code that write to invalid memory")
|
|
|
|
try:
|
|
|
|
# Initialize emulator in X86-32bit mode
|
|
|
|
mu = Uc(UC_ARCH_X86, UC_MODE_32)
|
|
|
|
|
|
|
|
# map 2MB memory for this emulation
|
|
|
|
mu.mem_map(ADDRESS, 2 * 1024 * 1024)
|
|
|
|
|
|
|
|
# write machine code to be emulated to memory
|
|
|
|
mu.mem_write(ADDRESS, X86_CODE32_MEM_WRITE)
|
|
|
|
|
|
|
|
# initialize machine registers
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.reg_write(UC_X86_REG_ECX, 0x1234)
|
|
|
|
mu.reg_write(UC_X86_REG_EDX, 0x7890)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
# tracing all basic blocks with customized callback
|
|
|
|
#mu.hook_add(UC_HOOK_BLOCK, hook_block)
|
|
|
|
|
|
|
|
# tracing all instructions with customized callback
|
|
|
|
#mu.hook_add(UC_HOOK_CODE, hook_code)
|
|
|
|
|
|
|
|
# intercept invalid memory events
|
|
|
|
mu.hook_add(UC_HOOK_MEM_INVALID, hook_mem_invalid)
|
|
|
|
|
|
|
|
try:
|
|
|
|
# emulate machine code in infinite time
|
|
|
|
mu.emu_start(ADDRESS, ADDRESS + len(X86_CODE32_MEM_WRITE))
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
# now print out some registers
|
|
|
|
print(">>> Emulation done. Below is the CPU context")
|
|
|
|
|
2015-08-24 04:36:33 +00:00
|
|
|
r_ecx = mu.reg_read(UC_X86_REG_ECX)
|
|
|
|
r_edx = mu.reg_read(UC_X86_REG_EDX)
|
2015-08-21 07:04:50 +00:00
|
|
|
print(">>> ECX = 0x%x" %r_ecx)
|
|
|
|
print(">>> EDX = 0x%x" %r_edx)
|
|
|
|
|
|
|
|
try:
|
|
|
|
# read from memory
|
|
|
|
print(">>> Read 4 bytes from [0x%x] = " %(0xaaaaaaaa), end="")
|
|
|
|
tmp = mu.mem_read(0xaaaaaaaa, 4)
|
|
|
|
for i in tmp:
|
|
|
|
print(" 0x%x" %i, end="")
|
|
|
|
print("")
|
|
|
|
|
|
|
|
print(">>> Read 4 bytes from [0x%x] = " %(0xffffffaa), end="")
|
|
|
|
tmp = mu.mem_read(0xffffffaa, 4)
|
|
|
|
for i in tmp:
|
|
|
|
print(" 0x%x" %i, end="")
|
|
|
|
print("")
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
|
|
|
|
# Test X86 32 bit with IN/OUT instruction
|
|
|
|
def test_i386_inout():
|
|
|
|
print("Emulate i386 code with IN/OUT instructions")
|
|
|
|
try:
|
|
|
|
# Initialize emulator in X86-32bit mode
|
|
|
|
mu = Uc(UC_ARCH_X86, UC_MODE_32)
|
|
|
|
|
|
|
|
# map 2MB memory for this emulation
|
|
|
|
mu.mem_map(ADDRESS, 2 * 1024 * 1024)
|
|
|
|
|
|
|
|
# write machine code to be emulated to memory
|
|
|
|
mu.mem_write(ADDRESS, X86_CODE32_INOUT)
|
|
|
|
|
|
|
|
# initialize machine registers
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.reg_write(UC_X86_REG_EAX, 0x1234)
|
|
|
|
mu.reg_write(UC_X86_REG_ECX, 0x6789)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
# tracing all basic blocks with customized callback
|
|
|
|
mu.hook_add(UC_HOOK_BLOCK, hook_block)
|
|
|
|
|
|
|
|
# tracing all instructions with customized callback
|
|
|
|
mu.hook_add(UC_HOOK_CODE, hook_code)
|
|
|
|
|
|
|
|
# handle IN & OUT instruction
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.hook_add(UC_HOOK_INSN, hook_in, None, UC_X86_INS_IN)
|
|
|
|
mu.hook_add(UC_HOOK_INSN, hook_out, None, UC_X86_INS_OUT)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
# emulate machine code in infinite time
|
|
|
|
mu.emu_start(ADDRESS, ADDRESS + len(X86_CODE32_INOUT))
|
|
|
|
|
|
|
|
# now print out some registers
|
|
|
|
print(">>> Emulation done. Below is the CPU context")
|
|
|
|
|
2015-08-24 04:36:33 +00:00
|
|
|
r_ecx = mu.reg_read(UC_X86_REG_ECX)
|
|
|
|
r_eax = mu.reg_read(UC_X86_REG_EAX)
|
2015-08-21 07:04:50 +00:00
|
|
|
print(">>> EAX = 0x%x" %r_eax)
|
|
|
|
print(">>> ECX = 0x%x" %r_ecx)
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
|
|
|
|
def test_x86_64():
|
|
|
|
print("Emulate x86_64 code")
|
|
|
|
try:
|
|
|
|
# Initialize emulator in X86-64bit mode
|
|
|
|
mu = Uc(UC_ARCH_X86, UC_MODE_64)
|
|
|
|
|
|
|
|
# map 2MB memory for this emulation
|
|
|
|
mu.mem_map(ADDRESS, 2 * 1024 * 1024)
|
|
|
|
|
|
|
|
# write machine code to be emulated to memory
|
|
|
|
mu.mem_write(ADDRESS, X86_CODE64)
|
|
|
|
|
|
|
|
# initialize machine registers
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.reg_write(UC_X86_REG_RAX, 0x71f3029efd49d41d)
|
|
|
|
mu.reg_write(UC_X86_REG_RBX, 0xd87b45277f133ddb)
|
|
|
|
mu.reg_write(UC_X86_REG_RCX, 0xab40d1ffd8afc461)
|
|
|
|
mu.reg_write(UC_X86_REG_RDX, 0x919317b4a733f01)
|
|
|
|
mu.reg_write(UC_X86_REG_RSI, 0x4c24e753a17ea358)
|
|
|
|
mu.reg_write(UC_X86_REG_RDI, 0xe509a57d2571ce96)
|
|
|
|
mu.reg_write(UC_X86_REG_R8, 0xea5b108cc2b9ab1f)
|
|
|
|
mu.reg_write(UC_X86_REG_R9, 0x19ec097c8eb618c1)
|
|
|
|
mu.reg_write(UC_X86_REG_R10, 0xec45774f00c5f682)
|
|
|
|
mu.reg_write(UC_X86_REG_R11, 0xe17e9dbec8c074aa)
|
|
|
|
mu.reg_write(UC_X86_REG_R12, 0x80f86a8dc0f6d457)
|
|
|
|
mu.reg_write(UC_X86_REG_R13, 0x48288ca5671c5492)
|
|
|
|
mu.reg_write(UC_X86_REG_R14, 0x595f72f6e4017f6e)
|
|
|
|
mu.reg_write(UC_X86_REG_R15, 0x1efd97aea331cccc)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
# setup stack
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.reg_write(UC_X86_REG_RSP, ADDRESS + 0x200000)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
# tracing all basic blocks with customized callback
|
|
|
|
mu.hook_add(UC_HOOK_BLOCK, hook_block)
|
|
|
|
|
|
|
|
# tracing all instructions in range [ADDRESS, ADDRESS+20]
|
|
|
|
mu.hook_add(UC_HOOK_CODE, hook_code, None, ADDRESS, ADDRESS+20)
|
|
|
|
|
|
|
|
# tracing all memory READ & WRITE access
|
|
|
|
mu.hook_add(UC_HOOK_MEM_WRITE, hook_mem_access)
|
|
|
|
mu.hook_add(UC_HOOK_MEM_READ, hook_mem_access)
|
|
|
|
# actually you can also use READ_WRITE to trace all memory access
|
|
|
|
#mu.hook_add(UC_HOOK_MEM_READ_WRITE, hook_mem_access)
|
|
|
|
|
|
|
|
try:
|
|
|
|
# emulate machine code in infinite time
|
|
|
|
mu.emu_start(ADDRESS, ADDRESS + len(X86_CODE64))
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
# now print out some registers
|
|
|
|
print(">>> Emulation done. Below is the CPU context")
|
|
|
|
|
2015-08-24 04:36:33 +00:00
|
|
|
rax = mu.reg_read(UC_X86_REG_RAX)
|
|
|
|
rbx = mu.reg_read(UC_X86_REG_RBX)
|
|
|
|
rcx = mu.reg_read(UC_X86_REG_RCX)
|
|
|
|
rdx = mu.reg_read(UC_X86_REG_RDX)
|
|
|
|
rsi = mu.reg_read(UC_X86_REG_RSI)
|
|
|
|
rdi = mu.reg_read(UC_X86_REG_RDI)
|
|
|
|
r8 = mu.reg_read(UC_X86_REG_R8)
|
|
|
|
r9 = mu.reg_read(UC_X86_REG_R9)
|
|
|
|
r10 = mu.reg_read(UC_X86_REG_R10)
|
|
|
|
r11 = mu.reg_read(UC_X86_REG_R11)
|
|
|
|
r12 = mu.reg_read(UC_X86_REG_R12)
|
|
|
|
r13 = mu.reg_read(UC_X86_REG_R13)
|
|
|
|
r14 = mu.reg_read(UC_X86_REG_R14)
|
|
|
|
r15 = mu.reg_read(UC_X86_REG_R15)
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
print(">>> RAX = %x" %rax)
|
|
|
|
print(">>> RBX = %x" %rbx)
|
|
|
|
print(">>> RCX = %x" %rcx)
|
|
|
|
print(">>> RDX = %x" %rdx)
|
|
|
|
print(">>> RSI = %x" %rsi)
|
|
|
|
print(">>> RDI = %x" %rdi)
|
|
|
|
print(">>> R8 = %x" %r8)
|
|
|
|
print(">>> R9 = %x" %r9)
|
|
|
|
print(">>> R10 = %x" %r10)
|
|
|
|
print(">>> R11 = %x" %r11)
|
|
|
|
print(">>> R12 = %x" %r12)
|
|
|
|
print(">>> R13 = %x" %r13)
|
|
|
|
print(">>> R14 = %x" %r14)
|
|
|
|
print(">>> R15 = %x" %r15)
|
|
|
|
|
|
|
|
#BUG
|
|
|
|
mu.emu_start(ADDRESS, ADDRESS + len(X86_CODE64))
|
|
|
|
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
|
2015-08-22 01:02:26 +00:00
|
|
|
def test_x86_64_syscall():
|
|
|
|
print("Emulate x86_64 code with 'syscall' instruction")
|
|
|
|
try:
|
|
|
|
# Initialize emulator in X86-64bit mode
|
|
|
|
mu = Uc(UC_ARCH_X86, UC_MODE_64)
|
|
|
|
|
|
|
|
# map 2MB memory for this emulation
|
|
|
|
mu.mem_map(ADDRESS, 2 * 1024 * 1024)
|
|
|
|
|
|
|
|
# write machine code to be emulated to memory
|
|
|
|
mu.mem_write(ADDRESS, X86_CODE64_SYSCALL)
|
|
|
|
|
2015-08-22 17:19:40 +00:00
|
|
|
def hook_syscall(mu, user_data):
|
2015-08-24 04:36:33 +00:00
|
|
|
rax = mu.reg_read(UC_X86_REG_RAX)
|
2015-08-22 17:19:40 +00:00
|
|
|
if rax == 0x100:
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.reg_write(UC_X86_REG_RAX, 0x200)
|
2015-08-22 01:02:26 +00:00
|
|
|
else:
|
|
|
|
print('ERROR: was not expecting rax=%d in syscall' % rax)
|
|
|
|
|
|
|
|
# hook interrupts for syscall
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.hook_add(UC_HOOK_INSN, hook_syscall, None, UC_X86_INS_SYSCALL)
|
2015-08-22 01:02:26 +00:00
|
|
|
|
|
|
|
# syscall handler is expecting rax=0x100
|
2015-08-24 04:36:33 +00:00
|
|
|
mu.reg_write(UC_X86_REG_RAX, 0x100)
|
2015-08-22 01:02:26 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
# emulate machine code in infinite time
|
|
|
|
mu.emu_start(ADDRESS, ADDRESS + len(X86_CODE64_SYSCALL))
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
# now print out some registers
|
|
|
|
print(">>> Emulation done. Below is the CPU context")
|
|
|
|
|
2015-08-24 04:36:33 +00:00
|
|
|
rax = mu.reg_read(UC_X86_REG_RAX)
|
2015-08-22 01:02:26 +00:00
|
|
|
print(">>> RAX = 0x%x" % rax)
|
|
|
|
|
|
|
|
except UcError as e:
|
|
|
|
print("ERROR: %s" % e)
|
|
|
|
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
if __name__ == '__main__':
|
|
|
|
test_i386()
|
|
|
|
print("=" * 20)
|
|
|
|
test_i386_loop()
|
|
|
|
print("=" * 20)
|
|
|
|
test_i386_invalid_mem_read()
|
|
|
|
print("=" * 20)
|
|
|
|
test_i386_invalid_mem_write()
|
|
|
|
print("=" * 20)
|
|
|
|
test_i386_inout()
|
|
|
|
print("=" * 20)
|
|
|
|
test_x86_64()
|
2015-08-22 01:02:26 +00:00
|
|
|
print("=" * 20)
|
|
|
|
test_x86_64_syscall()
|