{"id":2351,"date":"2014-05-21T00:24:45","date_gmt":"2014-05-21T00:24:45","guid":{"rendered":"http:\/\/www.hexacorn.com\/blog\/?p=2351"},"modified":"2014-06-05T15:16:43","modified_gmt":"2014-06-05T15:16:43","slug":"rce-list-of-64-bit-tools","status":"publish","type":"post","link":"https:\/\/www.hexacorn.com\/blog\/2014\/05\/21\/rce-list-of-64-bit-tools\/","title":{"rendered":"RCE: List of 64-bit tools"},"content":{"rendered":"<p>Update\u00a0 (June, 4th, 2014): Added Hex-Rays Decompiler\u00a0 x64<\/p>\n<p>64-bits platform is becoming a standard and reverse engineering of the PE32+ files is now a daily bread to many malware analysts. Tools that are designed to make things easier are luckily out there and new ones keep popping up all over the place. Unfortunately, many of the tools are not mature enough yet and often crash or do some funny stuff, but this is developing really fast and hopefully the RCE arsenal will expand soon.<\/p>\n<p>Here is a short list of the tools I came across and use most of them in my research and analysis of PE32+ files. If you know any other useful tools, I&#8217;d be grateful if you let me know. Thanks!<\/p>\n<p><strong>Docs<\/strong><\/p>\n<ul>\n<li>Very useful primer for x64 n00bs\u00a0 &#8211; <a href=\"http:\/\/uuu.enseirb.fr\/~amacabies\/\/pdf\/intro-to-x64-reversing.pdf\">http:\/\/uuu.enseirb.fr\/~amacabies\/\/pdf\/intro-to-x64-reversing.pdf<\/a>; contains useful examples and links [I don&#8217;t add them here; download PDF and take it from there]<\/li>\n<\/ul>\n<p><strong>Bypassing signature checks\/disabling PageGuard<\/strong><\/p>\n<ul>\n<li><span class=\"smallfont\">Driver Signature Enforcement Overrider 1.3b<\/span> &#8211; <a href=\"http:\/\/www.ngohq.com\/?page=dseo\">http:\/\/www.ngohq.com\/?page=dseo<\/a><\/li>\n<li><span class=\"fyyre\"><span class=\"lightgrey\"><span class=\"lightgrey\"><span class=\"lightgrey\"><span class=\"lightgrey\"><span class=\"fyyre\"><span class=\"fyyre\"><span class=\"lightgrey\"><span class=\"lightgrey\"><span class=\"lightgrey\">Disable PatchGuard &amp; Driver Signing on X64 Windows 7 + SP1<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> &#8211; <a href=\"http:\/\/fyyre.ivory-tower.de\/projects\/no_pg_ds_v3.rar\">http:\/\/fyyre.ivory-tower.de\/projects\/no_pg_ds_v3.rar<\/a><\/li>\n<li><span class=\"fyyre\"><span class=\"lightgrey\"><span class=\"lightgrey\"><span class=\"lightgrey\"><span class=\"lightgrey\"><span class=\"fyyre\"><span class=\"fyyre\"><span class=\"lightgrey\"><span class=\"lightgrey\">Disable PatchGuard on Windows 8 x64 &#8211; <\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><a href=\"http:\/\/fyyre.ivory-tower.de\/projects\/disable_pg_win8.rar\">http:\/\/fyyre.ivory-tower.de\/projects\/disable_pg_win8.rar<\/a><\/li>\n<\/ul>\n<p><strong>PE Viewer\/Editors supporting PE32+<br \/>\n<\/strong><\/p>\n<ul>\n<li>PEStudio &#8211; <a href=\"http:\/\/www.winitor.com\/\">http:\/\/www.winitor.com\/<\/a><\/li>\n<li>Explorer Suite &#8211; <a href=\"http:\/\/www.ntcore.com\/exsuite.php\">http:\/\/www.ntcore.com\/exsuite.php<\/a><\/li>\n<li>PE Insider &#8211; <a href=\"http:\/\/icerbero.com\/peinsider\/\">http:\/\/icerbero.com\/peinsider\/<\/a><\/li>\n<li>Hiew &#8211; <a href=\"http:\/\/www.hiew.ru\/\">http:\/\/www.hiew.ru\/<\/a><\/li>\n<li>Of course, there are many PE editors out there &#8211; if you can recommend any I&#8217;d appreciate if you give me a shout<\/li>\n<\/ul>\n<p><strong>Disassembler<\/strong><\/p>\n<ul>\n<li>IDA Pro &#8211; <a href=\"https:\/\/www.hex-rays.com\/products\/ida\/\">https:\/\/www.hex-rays.com\/products\/ida\/<\/a><\/li>\n<\/ul>\n<p><strong>Decompiler<\/strong><\/p>\n<ul>\n<li>Hex-Rays Decompiler <a href=\"https:\/\/www.hex-rays.com\/products\/decompiler\/news.shtml#140604\">https:\/\/www.hex-rays.com\/products\/decompiler\/news.shtml#140604<\/a><\/li>\n<li>SmartDec &#8211; <a href=\"http:\/\/derevenets.com\/download.html\">http:\/\/derevenets.com\/download.html<\/a><\/li>\n<li>C4 Decompiler &#8211; <a href=\"http:\/\/www.c4decompiler.com\/\">http:\/\/www.c4decompiler.com\/<\/a><\/li>\n<\/ul>\n<p><strong>Debugger <\/strong>(they are also disassemblers)<strong><br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.ollydbg.de\/odbg64.html\">Ollydbg 64<\/a> is still not ready, but there are a couple of tools that can be useful even if not that user-friendly:<\/p>\n<ul>\n<li>Windbg &#8211; <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/hardware\/ff551063%28v=vs.85%29.aspx\">http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/hardware\/ff551063%28v=vs.85%29.aspx<\/a><\/li>\n<li><span class=\"program\">PEBrowseDbg<\/span> &#8211; <a href=\"http:\/\/www.smidgeonsoft.prohosting.com\/pebrowse-pro-interactive-debugger.html\">http:\/\/www.smidgeonsoft.prohosting.com\/pebrowse-pro-interactive-debugger.html<\/a><\/li>\n<li>IDA debugger &#8211; <a href=\"https:\/\/www.hex-rays.com\/products\/ida\/\">https:\/\/www.hex-rays.com\/products\/ida\/<\/a><\/li>\n<li>FDBG &#8211; <a href=\"http:\/\/fdbg.x86asm.net\/\">http:\/\/fdbg.x86asm.net\/<\/a><\/li>\n<li>Nanomite &#8211; <a href=\"https:\/\/github.com\/zer0fl4g\/Nanomite\">https:\/\/github.com\/zer0fl4g\/Nanomite<\/a><\/li>\n<li>BugDBG &#8211; <a href=\"http:\/\/pespin.w.interia.pl\/\">http:\/\/pespin.w.interia.pl\/<\/a><\/li>\n<li>Edb-Debugger &#8211; <a href=\"https:\/\/code.google.com\/p\/edb-debugger\/\">https:\/\/code.google.com\/p\/edb-debugger\/<\/a><\/li>\n<li>Visual Dux Debugger &#8211; <a href=\"http:\/\/www.duxcore.com\/index.php\/prod\/visual-duxdebugger\/overview\">http:\/\/www.duxcore.com\/index.php\/prod\/visual-duxdebugger\/overview<\/a><\/li>\n<\/ul>\n<p><strong>Process \/ Memory Viewer<\/strong><\/p>\n<ul>\n<li>Process Hacker &#8211; <a href=\"http:\/\/processhacker.sourceforge.net\/\">http:\/\/processhacker.sourceforge.net\/<\/a><\/li>\n<\/ul>\n<p><strong>Process dumpers<\/strong><\/p>\n<ul>\n<li>Scylla &#8211; <a href=\"https:\/\/github.com\/NtQuery\/Scylla\">https:\/\/github.com\/NtQuery\/Scylla<\/a><\/li>\n<li>Procdump &#8211; <a href=\"http:\/\/technet.microsoft.com\/en-us\/sysinternals\/dd996900.aspx\">http:\/\/technet.microsoft.com\/en-us\/sysinternals\/dd996900.aspx<\/a><\/li>\n<\/ul>\n<p><strong>Hook Detector<\/strong><\/p>\n<ul>\n<li>HookShark &#8211; <a href=\"http:\/\/homeofgamehacking.de\/showthread.php?tid=823\">http:\/\/homeofgamehacking.de\/showthread.php?tid=823<\/a><\/li>\n<\/ul>\n<p><strong>API Monitor<\/strong><\/p>\n<ul>\n<li>Rohitab Api Monitor &#8211; <a href=\"http:\/\/www.rohitab.com\/downloads\">http:\/\/www.rohitab.com\/downloads<\/a><\/li>\n<\/ul>\n<p><strong>\u00a0Hiding Processes<\/strong><\/p>\n<ul>\n<li>Hidecon &#8211; <a href=\"http:\/\/fyyre.ivory-tower.de\/projects\/hidecon.rar\">http:\/\/fyyre.ivory-tower.de\/projects\/hidecon.rar<\/a><\/li>\n<\/ul>\n<p>Thanks to Ange and Nanu Jogi for fixes and suggestions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update\u00a0 (June, 4th, 2014): Added Hex-Rays Decompiler\u00a0 x64 64-bits platform is becoming a standard and reverse engineering of the PE32+ files is now a daily bread to many malware analysts. Tools that are designed to make things easier are luckily &hellip; <a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/05\/21\/rce-list-of-64-bit-tools\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[9,16],"tags":[],"_links":{"self":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/2351"}],"collection":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/comments?post=2351"}],"version-history":[{"count":16,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/2351\/revisions"}],"predecessor-version":[{"id":2356,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/2351\/revisions\/2356"}],"wp:attachment":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/media?parent=2351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/categories?post=2351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/tags?post=2351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}