Nico
January 18th, 2005, 14:58
Hello,
Quote:
[Originally Posted by blabberer]Dear nico
well i was bitten by this problem once so everytime i load unknown executable i physically change the bytes at enty point to 0xeb 0xfe
and load it that way the executable will load and loop at single place
and pressing f12 or esc in olly would pause the target in the entry point
which can be changed
|
This is a good practice, but i wouldn't trust it too much either.
One can run code before the entry point is executed, using a little TLS hack.
(Thread Local Storage). One could imagine, the TLS overwriting the bytes at Entry point, in order to make sure, everything runs fine
Quote:
but i thought it was related to only abnormal imagebase but you have quoted as modifying the Loaderbase blah is the reason
do you have the relevent disassembly in ollydbg like you have for softice where olly checks for this Loader Flags and loads it eventually ??
|
Unfortunately not, i loose my idb.
The imagebase in my case wasn't related. It also happens with a standard image base. I choose a weird imagebase, because i know a lot of reversers, that are used to "400000" and get crazy when they don't have their "marks".
It was just to tease them
For olly, i think it needs the modification of two fields in the PE header.
My original idea was having Olly to think it was a corrupted binary, thus,
it wouldn't load it. Unfortunately, it loads it nonetheless, but many people don't try to run it, after they see the bad message
Quote:
also after reading your submission i dusted off the dll which ran without stopping at ep once and glanced at the relevent places in both
the 0x90 and dll the dll doesnt have the Loader Flags modified or Rva blah
modified |
There are probably other issues in Olly.
Quote:
ive attached a screen shot i can send you the dll in question if you prefer so
|
I will check it out, thanks.
Quote:
any more details on this behaviour by ollydbg would be appreciated
|
I am not a huge fan of olly myself, so i don't really know anything more, beside what i said. I wish i still had that idb file..
All i did, was a quick and dirty reverse engineering of Olly to find this.
I mostly only use IDA, to do static analysis. And use Soft ICE when i need to.
Or IDA's debugger, to use its nice disassembly.
Best Regards,
Nico