lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <47A760D6.3090404@immunityinc.com>
Date: Mon, 04 Feb 2008 17:00:38 -0200
From: Nicolas Waisman <nicolas@...unityinc.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Immunity Debugger v1.4 Release

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Immunity is proud to announce: Immunity Debugger v1.4 "veni, vidi, pwn"

We would like to express our appreciation for the enormous amount of
contributions, feedback and requests we receive daily from the Immunity
Debugger community at http://forum.immunityinc.com.

Our TODO list seems infinite but we are getting the most requested
features out there for you guys.

New in this release: a proper process detach, a Second Pass Analysis
which will soon grow into better argument/local variable recognitions
and a new Silent Mode for batch scripts.

Last but not least, we have included a collection of new scripts
including a lot of contributions from forum regular Bob (scanpe.py,
hidedebug.py and bpxep.py) and the contest winning plugin from JMS
(Instead of a candle dinner with Kostya, he received a brand new job as
a Developer on the CANVAS team).

Thanks for using Immunity Debugger! We hope you enjoy this month's
release, Check out the Changelog below for more detailed information.

You can upgrade your current Immunity Debugger by going to Help/Update
or directly downloading the new installer from
http://debugger.immunityinc.com/register.html

Sincerely
Team Immunity
http://www.immunityinc.com

PS: Feedback, Requests, Scripts and Cool Screenshots are always
welcome at http://forum.immunityinc.com

1.40 Build 0

New Features:

- - Debugger Core:
  o Added Silent Debugging Flag [accesible via Debugging options ALT-O
or via immlib]
    http://forum.immunityinc.com/index.php?topic=157.0
  o Added Analysis Second Pass [Decoding Functions]
    http://forum.immunityinc.com/index.php?topic=163.0

- - Debugger GUI Core:
  o Now you can add headers + other useful information on every Row
    displayed at the Disasm Window. The information will be saved
    as part of dump struct.
  o Dettach option added to File Menu: Go to File -> Dettach [You need
to be attached to
    gray out Dettach]
    http://forum.immunityinc.com/index.php?topic=158.0


- - Debugger GUI:
  o Right click on disasm line -> Add Header will add headers to your line



- - Immunity Debugger API:
  o Row Headers / Adding Lines to CPU
    - Added imm.addHeader() and imm.getHeader() methods.
    - imm.addLine behaves like addHeader()
    - Added imm.removeHeader()/imm.removeLine() &&
imm.getHeader()/imm.getLine()
    - Added imm.getTraceArgs()

  o Added imm.goSilent() method.
  o Added imm.undecorateName() method: Undecorate symbol names
    http://forum.immunityinc.com/index.php?topic=159.0
  o Added imm.Dettach() method: Dettach current process from debugger
  o Added imm.prepareForNewProcess() method: Prepare Debugger core for a
fresh start
  o Updated BoB's UserDB.txt (http://peid.info/BobSoft/Downloads.html)

- - PyCommands:
  o Added namefunc.py : a simple samplescript that uses imm.addHeader to
name
    functions in module
  o Added traceargs.py: find User supplied arguments into a given function.
  o Added JMS's Mike & Boo script
  o User Contributed PyCommands:
     - BoB (http://PEiD.info/BobSoft/)
       * scanpe.py (http://forum.immunityinc.com/index.php?topic=137.0)
       * hidedebug.py (http://forum.immunityinc.com/index.php?topic=140.0)
       * bpxep.py (http://forum.immunityinc.com/index.php?topic=138.0)


Bug Fixes:

- - Fixed error when adding knowledge and changing python enviroments later.
  (__dict__ not accesible in restricted mode error)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHp2DWnx8KWzmcRsERAju5AKCfqxxOfzlHSJthrJou04kI0ekwSACgpvqt
Ld9oTgMCWJD5i9zjKH6RZzE=
=TVk0
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ