본문 바로가기

스터디/└ 소스파일들

Soft Breakpoint 까지의 소스들


my_debugger.py


my_debugger_defines.py


my_test.py


printf_loop.py



my_debugger.py



# -*- coding: cp949 -*-
from ctypes import *
from my_debugger_defines import *

kernel32 = windll.kernel32

class debugger():

    def __init__(self):
        self.h_process       =     None
        self.pid             =     None
        self.debugger_active =     False
        self.h_thread        =     None
        self.context         =     None
        self.exception       =     None
        self.exception_address  =   None
        self.breakpoints    = {} 
        self.first_breakpoint = True
        # Here let's determine and store 
        # the default page size for the system
        # determine the system page size.

        
              
                
    def load(self,path_to_exe):
        
        # dwCreation flag determines how to create the process
        # set creation_flags = CREATE_NEW_CONSOLE if you want
        # to see the calculator GUI
        creation_flags = DEBUG_PROCESS
    
        # instantiate the structs
        startupinfo         = STARTUPINFO()
        process_information = PROCESS_INFORMATION()
        
        # The following two options allow the started process
        # to be shown as a separate window. This also illustrates
        # how different settings in the STARTUPINFO struct can affect
        # the debuggee.
        startupinfo.dwFlags     = 0x1
        startupinfo.wShowWindow = 0x0
        
        # We then initialize the cb variable in the STARTUPINFO struct
        # which is just the size of the struct itself
        startupinfo.cb = sizeof(startupinfo)
        
        if kernel32.CreateProcessA(path_to_exe,
                                   None,
                                   None,
                                   None,
                                   None,
                                   creation_flags,
                                   None,
                                   None,
                                   byref(startupinfo),
                                   byref(process_information)):
            
            print "[*] We have successfully launched the process!"
            print "[*] PID : %d" % process_information.dwProcessId
            
            # 새로 생성한 프로세스의 핸들을 구한 후
            # 나중에 접근하기 위해 저장한다.
            self.h_process = self.open_process(process_information.dwProcessId)

        else:    
            print "[*] Error : 0x%08x." % kernel32.GetLastError()


    def open_process(self,pid):
        
        # PROCESS_ALL_ACCESS = 0x0x001F0FFF
        h_process = kernel32.OpenProcess(PROCESS_ALL_ACCESS,False,pid) 
        return h_process
    
    
    def open_thread(self, thread_id):   # thread_id를 인자로 전달해주면 해당 thread의 핸들을 리턴한다.
        h_thread = kernel32.OpenThread(THREAD_ALL_ACCESS, None, thread_id)
        
        if h_thread is not None:
            return h_thread
        else:
            print "[*] Could not obtain a valid thread handle."
            return False
        
        
    def enumerate_threads(self):
        thread_entry = THREADENTRY32()    # Thread32First 실행인자로 전달되는 구조체
        thread_list = []
        snapshot = kernel32.CreateToolhelp32Snapshot(TH32CS_SNAPTHREAD, self.pid)
            
        if snapshot is not None:
            # 먼저 구조체의 크기를 설정해야 한다.
            thread_entry.dwSize = sizeof(thread_entry)
            success = kernel32.Thread32First(snapshot, byref(thread_entry))
            
            while success:
                if thread_entry.th32OwnerProcessID == self.pid:
                    thread_list.append(thread_entry.th32ThreadID)
                    
                success = kernel32.Thread32Next(snapshot, byref(thread_entry))
                # Thread32First 함수 실행 후에는 Thread32Next 함수로 스레드 리스트를 끝까지 열거한다.
                
            kernel32.CloseHandle(snapshot)
            return thread_list
        else:
            return False
        
            
    def get_thread_context (self, thread_id=None, h_thread=None):
        context = CONTEXT()     # 디버그 레지스터에 대한 정보를 담고있는 CONTEXT 구조체이다.
        context.ContextFlags = CONTEXT_FULL | CONTEXT_DEBUG_REGISTERS
        
        # 스레드의 핸들을 구한다.
        if h_thread is None:
            self.h_thread = self.open_thread(thread_id)
        if kernel32.GetThreadContext(self.h_thread, byref(context)):
            # 레지스터 정보를 얻기 위해서 GetThreadContext 함수를 사용한다.
            # 첫 인자는 레지스터를 얻고자 하는 스레드의 핸들이며, 두번째는 정보가 저장되어야 하는 context의 포인터이다.
            return context
        else:
            return False
        
        
    def attach(self,pid):
        
        self.h_process = self.open_process(pid)
        
        # 프로세스에 대한 어태치를 시도한다.
        # 실패하면 호출을 종료한다.
        if kernel32.DebugActiveProcess(pid):
            self.debugger_active = True
            self.pid             = int(pid)
                                  
        else:
            print "[*] Unable to attach to the process."
            
            
    def run(self):
        
        # 이제 디버기에 대한 디버그 이벤트를 처리해야 한다. 
        # debugging events           
        while self.debugger_active == True:
            self.get_debug_event() 
            
    
    def get_debug_event(self):
        resultMap = {
            1:"EXCEPTION_DEBUG_EVENT",
            2:"CREATE_THREAD_DEBUG_EVENT",
            3:"CREATE_PROCESS_DEBUG_EVENT",
            4:"EXIT_THREAD_DEBUG_EVENT",
            5:"EXIT_PROCESS_DEBUG_EVENT",
            6:"LOAD_DLL_DEBUG_EVENT",
            7:"UNLOAD_DLL_DEBUG_EVENT",
            8:"OUTPUT_DEBUG_STRING_EVENT",
            9:"RIP_EVENT"
        }
        
        debug_event     = DEBUG_EVENT()
        continue_status = DBG_CONTINUE
        
        if kernel32.WaitForDebugEvent(byref(debug_event), INFINITE):
            
            # 스레드의 컨텍스터 정보를 구한다.
            self.h_thread = self.open_thread(debug_event.dwThreadId)
            self.context = self.get_thread_context(h_thread = self.h_thread)
            self.debug_event = debug_event
            print "Event Code: %d : %s / Thread Id: %d" % (debug_event.dwDebugEventCode,resultMap.get(debug_event.dwDebugEventCode), debug_event.dwThreadId)
            
            if debug_event.dwDebugEventCode == EXCEPTION_DEBUG_EVENT:
                #exception = debug_event.u.Exception.ExceptionRecord.ExceptionCode
                self.exception = debug_event.u.Exception.ExceptionRecord.ExceptionCode
                self.exception_address = debug_event.u.Exception.ExceptionRecord.ExceptionAddress

                if self.exception == EXCEPTION_ACCESS_VIOLATION:
                    print "Access Violation Detected."

                elif self.exception == EXCEPTION_BREAKPOINT:
                    continue_status = self.exception_handler_breakpoint()
                
                elif self.exception == EXCEPTION_GUARD_PAGE:
                    print "Guard Page Access Detected."
                
                elif self.exception == EXCEPTION_SINGLE_STEP:
                    print "Single Stepping."
                

            kernel32.ContinueDebugEvent(
                    debug_event.dwProcessId,
                    debug_event.dwThreadId,
                    continue_status)
            
            
    def detach(self):
        
        if kernel32.DebugActiveProcessStop(self.pid):
            print "[*] Finished debugging. Exiting..."
            return True
        else:
            print "There was an error"
            return False

    def exception_handler_breakpoint(self):
        #print "[+] Inside the breakpoint handler."
        print "Exception Address: 0x%08x" % self.exception_address
        if not self.breakpoints.has_key(self.exception_address):
            if self.first_breakpoint == True:
                self.first_breakpoint = False
                print "[+] Hit the first breakpoint."
                return DBG_CONTINUE
        else:
            print "[+] Hit user defined breakpoint."
            self.write_process_memory(self.exception_address,self.breakpoints[self.exception_address])
            self.context = self.get_thread_context(h_thread=self.h_thread)
            self.context.Eip -= 0x01 # Error!
            kernel32.SetThreadContext(self.h_thread,byref(self.context))
            continue_status = DBG_CONTINUE

        return continue_status

    def read_process_memory(self,address,length):
        data    = ""
        read_buf    = create_string_buffer(length)
        count   = c_ulong(0)

        if not kernel32.ReadProcessMemory(self.h_process,address,read_buf,length,byref(count)):
            return False

        else:
            data = data + read_buf.raw
            return data
    def write_process_memory(self,address,data):
        count = c_ulong(0)
        length = len(data)

        c_data = c_char_p(data[count.value:])

        if not kernel32.WriteProcessMemory(self.h_process,address,c_data,length,byref(count)):
            return False

        else:
            return True
    def bp_set(self,address):
        if not self.breakpoints.has_key(address):
            try:
                #원래의 바이트 값을 저장
                original_byte = self.read_process_memory(address,1)
            
                # cc opcode write
                self.write_process_memory(address,"\xCC")

                # 리스트에 bp 추가
                self.breakpoints[address] = (original_byte)
                print self.breakpoints[address]
            except:
                return False
            return True
    

    def resolve_func(self,dll,function):
        handle = kernel32.GetModuleHandleA(dll)
        address = kernel32.GetProcAddress(handle,function)

        kernel32.CloseHandle(handle)

        return address

my_test.py




# -*- coding: cp949 -*-
import my_debugger
f=open("pid.txt",'r')
pid=f.readline()


debugger = my_debugger.debugger()
printf_address = debugger.resolve_func("msvcrt.dll","printf")
debugger.attach(int(pid))
#pid = raw_input("Enter the PID of the process to attach to: ")
print "pid : %s" % pid
print "[+] Address of printf : 0x%08x" % printf_address
debugger.bp_set(printf_address)
debugger.run()
debugger.detach()

'스터디 > └ 소스파일들' 카테고리의 다른 글

Memory Breakpoint 까지의 소스  (0) 2015.01.17
Hardware Breakpoint 까지 소스  (0) 2015.01.17
my_test.py  (0) 2015.01.15
my_debugger_defines.py  (0) 2015.01.15
my_debugger.py  (0) 2015.01.15