Reversing PCode Args


Author: David Zimmer
Date: 08.19.19 - 8:30pm





Note: Vbdec now has its own product page

Here is a quick two part video on finding an unhandled opcode that requires byte stream arguments.

In the first video we: find a suitable target, discover when it is generated, recreate its use in a test project, and deduce what the bytecode args mean.

In the second video we fire up the pcode debugger and watch live data to make sure our understanding is correct.

FUN!








Comments: (0)

 
Leave Comment:
Name:
Email: (not shown)
Message: (Required)
Math Question: 43 + 13 = ? followed by the letter: K 



Twitter
RSS
About Me
More Blogs
Main Site
Posts: (All)
2020 ( 5 )
2019 (12)
     Yara WorkBench
     SafeArrayGetVartype
     vbdec dbg updates
     vb6 PCode NOP
     vb6 API and call backs
     how pcode works Pt1
     PrintFile
     ImpAdCallNonVirt
     Reversing PCode Args
     VB6 PCode Disassembly
     VB6 PCode Debugger
     UConnect Disable Cell Modem
2017 (5)
     IDA python over IPC
     dns wildcard blocking
     64bit IDA Plugins
     anterior lines
     misc news/updates
2016 ( 4 )
2015 ( 6 )
2014 ( 5 )
2013 ( 9 )
2012 ( 13 )
2011 ( 19 )
2010 ( 11 )
2009 ( 1 )