[<prev] [next>] [day] [month] [year] [list]
Message-ID: <47ECCBB8.7040400@immunitysec.com>
Date: Fri, 28 Mar 2008 07:43:04 -0300
From: Nicolas Waisman <nicolas@...unitysec.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Immunity Debugger v1.5
Immunity team is proud to present: Immunity Debugger 1.5
This new Immunity Debugger release provides a lot of new scripts and
important fixes. New scripts to improve your debugging experience
include: gflags, hookssl, and hookndr.
The API has been reinforced with new functionality which allows you to
gather more information from the remote process, such as Threads,
findRetValue. This release also includes some important fixes such as
correct Memory Page protection flags, which are also available via the
Python API.
Check the Changelog below for the details of this exciting release.
As usual, you can discuss your scripts, request new features or just hang
out at our forum: http://forum.immunityinc.com. We would like to thank
Teddy Roggers from tuts4you for maintaining a list of Immunity Debugger
ported plug-ins that can be found at
http://www.tuts4you.com/download.php?list.74
Do you want to hire a hacker? Are you looking for job? Immunity has
extended the Immunity Debugger Advertisment service to hackers, reverse
engineers and debugger freaks and it is now free for job seekers!
Job seekers can place ads at
http://debugger.immunityinc.com/hireahacker.html
Happy debugging (and job hunting)!
Team Immunity
P.S.: If you want to request a feature, show off your script or just
chat about Immunity Debugger, Justin Seitz from the Immunity Debugger
team will be at CanSecWest for the next three days.
1.50 Build 0
New Features:
- Debugger:
o Added "Servers" folder with specific PyCommand listeners - for
example, hookssl.py will send all the data back to a XML-RPC service
using ssl_listener.py, which then has the option to change it and send
it back.
- Memory Pages:
o Working on Windows Vista. Now correct on Windows XP, 2000, 2003.
Immunity Debugger API:
o Added imm.vmQuery() wrapper [Query Virtual Memory pages]
o The MemoryPage class has been improved.
- Protect and Allocation Protect Flags are queried in real-time
- You can get a human readable flag passing human = 1 to
page.getAccess() and page.getInitAccess()
o Added:
- searchOnExecute()
- searchOnRead()
- searchOnWrite()
These methods will search in any memory page with access = any
combination.
o Modified:
- Search()
- searchShort()
- searchLong()
to receive an extra flag parameter to specify memory protection type
when searching.
o Added imm.isAdmin() : is ID running as admin?
o Added Thread class to debugtypes.py
o Added imm.getAllThreads() method
o librecognition.py : Improved REGEXP support for the indexed register
search
o Added Function.findRetValue Find all the possible values on a Function
o GFlags class Handle Windows Global Flags.
PyCommands:
o gflags.py: Enable/Disable Windows Global Flags
o recognize.py: Backward compatability
o Added hookssl.py
o Added ssl_listener.py to Servers directory
o Added hookndr.py: Hooks the NDR unmarshalling routines and prints them
out so you can see which ones worked
o Added nohooks.py : removes all hooks from memory
Bug Fixes:
- Debugger Core
o The memory page protect information is correctly displayed now.
o Fixed Second Analysis pass repeated entries bug.
o Fixed thread state swap issue which was leading to a memory leak.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists