Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 7 Jun 2006 15:38:25 -0700 (PDT)
From: ByteRage <byterage@...oo.com>
To: john-users@...ts.openwall.com
Subject: Re: Assembly files

--- David Luyer <david@...er.net> wrote:

> On 7/6/06 3:01 PM, "David Luyer" <david@...er.net>
> wrote:
> 
> > On 7/6/06 3:45 PM, "Ami Schwartzman"
> <samis@...technion.ac.il> wrote:
> > 
> >> Hi
> >> 
> >> 
> >> Me and my friend are in the process of migrating
> John to Visual C++.  We
> >> have successfully migrated all files (based on
> MinGW jumbo patch) and
> >> have only the two assembly files x86.S and
> x86-mmx.S (later on sse) left.
> >> 
> >> 
> >> Now, these files are written for the GNU
> assembler (in AT&T syntax and
> >> also needs to be preprocessed).  Is there a
> version for MASM or
> >> something in Intel syntax out there?

Something that might work is assembling with gnu
assembler and then disassembling the generated code
with the deadlister program IDA, which can produce
Intel syntax code that you can copy & paste into a
text file which tends to assemble with minor adaptions
in NASM... Assembling it with MASM may be a bit more
tricky but I'm sure it's all doable :)
I have been succesful reverse engineering blocks of
cryptographic code from binaries before with this
approach, integrating them in projects while skipping
the necessity of identification/modification of the
blocks of cryptographic code themselves at an early
point in the reverse engineering proces.

cheers,

Joachim De Zutter

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.