The example file can be downloaded here: unpack_dll.zip
This step is required for
Dll shelling. The most critical step for
Dll shelling is to use LordPE to modify its Dll flag, open
LordPE, and click on the feature value. ...
, then uncheck theDLL` flag. After saving, the system will treat the file as an executable file.
We changed the
UnpackMe.dll suffix to
UnpackMe.exe and loaded it with OD.
Usually at the entry point, the program will save some information, here is very simple, just make a
cmp. One thing to note is that the
jnz jump here jumps directly to the end of the
unpacking process. So we Need to modify the
z flag of the register to invalidate the jump. Also set a breakpoint at the end of the
unpacking process to avoid shelling and then run directly. (The program will break at this breakpoint, but the shell has been Finished, the code is very clear)
The basic steps of
Dll shelling are the same as the
exe file shelling, and when rebuilding ʻIAT
, you need to follow the previous article [Manually find IAT and use ImportREC to rebuild] (/reverse/unpack/manually-fix-iat /index.html) As mentioned, manually find theIAT
table and rebuild it withImportREC
. Just note that after unpacking the dump, remember to restore theDLL
flag with LordPE and append the file name. Change to.dll`.
本页面的全部内容在 CC BY-NC-SA 4.0 协议之条款下提供，附加条款亦可能应用。