|
Message-ID: <20060607223825.8141.qmail@web33403.mail.mud.yahoo.com> Date: Wed, 7 Jun 2006 15:38:25 -0700 (PDT) From: ByteRage <byterage@...oo.com> To: john-users@...ts.openwall.com Subject: Re: Assembly files --- David Luyer <david@...er.net> wrote: > On 7/6/06 3:01 PM, "David Luyer" <david@...er.net> > wrote: > > > On 7/6/06 3:45 PM, "Ami Schwartzman" > <samis@...technion.ac.il> wrote: > > > >> Hi > >> > >> > >> Me and my friend are in the process of migrating > John to Visual C++. We > >> have successfully migrated all files (based on > MinGW jumbo patch) and > >> have only the two assembly files x86.S and > x86-mmx.S (later on sse) left. > >> > >> > >> Now, these files are written for the GNU > assembler (in AT&T syntax and > >> also needs to be preprocessed). Is there a > version for MASM or > >> something in Intel syntax out there? Something that might work is assembling with gnu assembler and then disassembling the generated code with the deadlister program IDA, which can produce Intel syntax code that you can copy & paste into a text file which tends to assemble with minor adaptions in NASM... Assembling it with MASM may be a bit more tricky but I'm sure it's all doable :) I have been succesful reverse engineering blocks of cryptographic code from binaries before with this approach, integrating them in projects while skipping the necessity of identification/modification of the blocks of cryptographic code themselves at an early point in the reverse engineering proces. cheers, Joachim De Zutter __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.