Here's a small list of the latest changes in the development version:

 - new command 'ax' to analyze xrefs. doesnt works well on debugger yet
   - better integration from radare
   - new xrefs -b flag to specify the base address (0x8048000)
 - cursor in visual mode can now scroll config.seek
 - some examples of code injection scripts in lua (scripts/inject) ..see below
 - LWP info support for freebsd + lot of fixups for this platform
 - new command 'af' to analyze functions
   - tries to identify the beggingin and the end of a function starting in 
current seek.
   - you can interpret the output to folder code (.af)
 - two new IO plugins:
   - mmap:// - for mmaping files (chat in hexa? ;D)
   - shm://  - to open shared memory sections (quite buggy atm)


[EMAIL PROTECTED]/prg/radare$ cat scripts/inject/inj.lua 
---------------------------------------------
-- Example injecting a file and adding a hook
--

function hook_x86(from, to, file)
 r.cmd("wf "..file.." @ "..to)
 r.cmd("wa jmp "..from)
end

hook_x86(0x8048000, 0x8049000, "/tmp/file")

[EMAIL PROTECTED]/prg/radare$ cat scripts/inject/dump-text.lua 
-- flag sections
r.cmd(".!rsc flag-sections $FILE")
r.cmd("eval file.baddr = 0x8048000")
r.cmd("seek section_text");
r.cmd("bsize section_text_end-section_text");
print("-------------");
print(r.cmd("pX"))
r.cmd("q")

[EMAIL PROTECTED]/prg/radare$ cat scripts/inject/Makefile      
all:
 as shellcode.s
 ld shellcode.o -o shellcode
 radare -i dump-text.lua shellcode > shellcode.text


this generates a hexpairs file with the bytes of the text section of our 
shellcode.s
ready to be injected :)

Enjoy!

--pancake
_______________________________________________
radare mailing list
[email protected]
http://lists.nopcode.org/listinfo.cgi/radare-nopcode.org

Reply via email to