|
Message-ID: <4487C6CD.9080207@t2.technion.ac.il> Date: Thu, 08 Jun 2006 08:42:21 +0200 From: Ami Schwartzman <samis@...technion.ac.il> To: john-users@...ts.openwall.com Subject: Re: Assembly files ByteRage wrote: > --- David Luyer <david@...er.net> wrote: > > >> On 7/6/06 3:01 PM, "David Luyer" <david@...er.net> >> wrote: >> >> >>> On 7/6/06 3:45 PM, "Ami Schwartzman" >>> >> <samis@...technion.ac.il> wrote: >> >>>> Hi >>>> >>>> >>>> Me and my friend are in the process of migrating >>>> >> John to Visual C++. We >> >>>> have successfully migrated all files (based on >>>> >> MinGW jumbo patch) and >> >>>> have only the two assembly files x86.S and >>>> >> x86-mmx.S (later on sse) left. >> >>>> Now, these files are written for the GNU >>>> >> assembler (in AT&T syntax and >> >>>> also needs to be preprocessed). Is there a >>>> >> version for MASM or >> >>>> something in Intel syntax out there? >>>> > > Something that might work is assembling with gnu > assembler and then disassembling the generated code > with the deadlister program IDA, which can produce > Intel syntax code that you can copy & paste into a > text file which tends to assemble with minor adaptions > in NASM... Assembling it with MASM may be a bit more > tricky but I'm sure it's all doable :) > I have been succesful reverse engineering blocks of > cryptographic code from binaries before with this > approach, integrating them in projects while skipping > the necessity of identification/modification of the > blocks of cryptographic code themselves at an early > point in the reverse engineering proces. > > cheers, > > Joachim De Zutter > > __________________________________________________ > Do You Yahoo!? > Tired of spam? Yahoo! Mail has the best spam protection around > http://mail.yahoo.com > > That's a good idea. I'll try that. Thanks
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.