# cat parser.py
# tshark -nr session.pcapng -T fields -e data -qz follow,tcp,raw,3|tail -n +7| tr -d '=\r\n\t'|less|xxd -r -p > follow_tcp_stream3
# python parser.py follow_tcp_stream3 vfile
# ls 2f*
# cat 2f70726f632f353937392f6d617073.bin
# python parser.py follow_tcp_stream3 memory 55555555
# r2 55555555.bin
[0x00000000]> s 0x00004831
[0x00004831]> pd 44
[0x00004831]> s 0x4909
[0x00004909]> pd 58
# ipython
In [1]: table = [0x8e, 0x32, 0x2f, 0x39, 0xea, 0x2d, 0x27, 0x39, 0xea, 0x27, 0xea, 0x88, 0x25, 0x94, 0x3b, 0x30, 0x39, 0x2f, 0x29, 0x39, 0xea, 0x2e, 0x27, 0x39, 0x31, 0xea, 0x8f, 0xea, 0x5d, 0x2b, 0x5b, 0x39, 0x39, 0xf0]
...: r = ''
...: for e in table:
...: r += chr(((((e - 0x63) ^ 0x5a) - 0x63) ^ 0x5a) & 0xff)
...: print r
...:
Source
https://www.youtube.com/watch?v=7zTtVYjjquA (1:58:10)
Reference
https://sourceware.org/gdb/onlinedocs/gdb/Remote-Protocol.html
No comments:
Post a Comment