Reader small image

You're reading from  Windows APT Warfare

Product typeBook
Published inMar 2023
Reading LevelIntermediate
PublisherPackt
ISBN-139781804618110
Edition1st Edition
Languages
Tools
Right arrow
Author (1)
Sheng-Hao Ma
Sheng-Hao Ma
author image
Sheng-Hao Ma

Sheng-Hao Ma is currently working as a threat researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. He has served as a speaker and instructor for various international conferences and organizations such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education.
Read more about Sheng-Hao Ma

Right arrow

tinyLoader example

The following example is the peLoader.cpp source code under the Chapter#6 folder of the GitHub project. In order to save space, this book only extracts the highlighted code; please refer to the complete source code see all the details of the project.

We first compile our msgbox.c source code as we did in Chapter 1 with MinGW and use the -Wl,--dynamicbase,--export-all-symbols arguments to generate an EXE file with a relocation table, msgbox_reloc.exe, as shown in Figure 6.3:

Figure 6.3 – The generation of msgbox_reloc.exe

Figure 6.3 – The generation of msgbox_reloc.exe

Figure 6.4 shows the fixReloc function responsible for correcting the relocation task for the entire PE module:

Figure 6.4 – The fixReloc function

Figure 6.4 – The fixReloc function

At lines 56-57 of the code, we can retrieve the starting point of the relocation table held in the current .reloc section from DataDirectory[IMAGE_BASE_RELOCATION] and later use it to analyze the relocation fields.

At lines...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Windows APT Warfare
Published in: Mar 2023Publisher: PacktISBN-13: 9781804618110

Author (1)

author image
Sheng-Hao Ma

Sheng-Hao Ma is currently working as a threat researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. He has served as a speaker and instructor for various international conferences and organizations such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education.
Read more about Sheng-Hao Ma