Without futher ado, lets start!
Enter Immunity Debugger
Okay before I start I would like to provide a very brief intro into what I'm about to cover for those of you who might not know what PyCommands are.
Essentially PyCommands are commands (or more specifically, Python scripts) that you can run from within Immunity Debugger that allow you to essentially control various parts of the debugger while it is running. This essentially means that Immunity Debugger is what is known as a "scriptable debugger", and if you don't know what that means, please use your good friend Google who will kindly tell you a much better answer than I can provide here :)
Getting Started
Okay first off we are going to need to get Immunity Debugger, which can be downloaded from here:
http://debugger.immunityinc.com/register.html
Please note that the registration info is not needed. In fact you can just click next and continue on.
Next, take a look at the API help guide. While its not much it will help you to make future programs so go ahead and take a look though what functions Immunity Debugger provides for you. It might not make sense right now, but it will give you an idea of the power that is involved.
Access it by doing the following:
1. Open up Immunity Debugger
2. Go to Help, then select "Select API help file"
3. Go to the Documentation file under the Immunity Debugger installation file
4. Select IMMLIB.HLP
Also you can take a look at the online documentation located at http://debugger.immunityinc.com/Documentation/ (this address is new, some old books may reference a different address but this is the one that works atm)
Running A PyCommand
To run a command, make sure that it is in you PyCommands folder in Immunity Debugger and then find that white box at the bottom and enter:
!(name of the script goes here) (arg1) (futher arguments)
And then once done, check the Log window (if you don't know where that is, then just go to View and then select Log)
Also please note that all of the scripts that we will be viewing/writing today are based on Python 2.x, not Python 3.x. Make sure you remember that as there are slight differences between the two, and thus this might affect your results. Just saying...feel free to use 3.x if you REALLY want to (hehe).
Basic Structure of A PyCommand Script
Okay what follows is what you need at a minimal outline to create PyCommand script:
*enter code mode*
#!/usr/bin/env python
from immlib import *
def main(args):
# Instantiate a immlib.Debugger instance of the current debugger process that is running right now.
imm = Debugger()
*Any commands would go here at this point. Sorry about formatting as Blogger is a bi**h with code ;)*
# This command is not required, its only so that the command returns input to the user so that they know that the script is done (this is displayed below the white box where you enter the commands)
return "[*] PyCommand Executed!"
* End code mode*
A Couple of Simple Commands + Bits of Information
- imm.log("String goes here %d" % a number in this case, *if you want, instead of the code displaying 0xBADF00D, it will display the memory address you place here (note that the decimal value you place here will be converted into a hex value*)
- This writes the given message to Immunity Debuggers logs (which can be viewed via View-> Logs). If an address is specified, then that is used in place of the address 0xBADF00D.
- imm.updateLog()
- Normally when a script runs, the log will only be updated after the script has finished running. If you want the logs to update at a certain spot instead of waiting till the end, then place this after your calls to imm.log() to have Immunity's logs update themselves right then and there. Useful if you doing CPU intensive processes and you want to notify the user of what's going on, however note that this will cause the process to take a bit longer to run than if you didn't use the updateLog() call.
- imm.createTable('Name', ['name of column one', 'name of column two', 'and so on'])
- Creates a table with the name (in this case Name) and then adds the columns with their given names to the table
- table.add(0 , ["column one's value", "column two's value", "etc"])
- Pretty self explanatory, 0 is just the number (starting from 0) of the table
- imm.assemble(*insert your variable here*)
- Transforms you variable into assembly code.
- imm.search(*insert variable here*)
- Searches all of the memory in the current process for your selected variable (which must be in assembly code mind you) and returns a list of addresses where it found that variable in memory.
- imm.readMemory(address, size)
- Read size bytes from the address located in address and return them.
- imm.writeMemory(address, buf)
- Write the assembly buffer buf into the address located at address
- imm.ps()
- List all the running processes and return (according to the docs) a "list of tuples with process information (pid, name, path, services, tcp list, udp list)"
- imm.searchCommands(cmd)
- Search in all loaded executables for a given command (the command must be given as a string) with newlines represented by "\n" (minus quotes)
- imm.getRegs()
- Returns a Dictionary of all of the x86 registers
- imm.setRegs(reg, value)
- Sets the register represented by the string reg to the DWORD value value.
- imm.getPEB()
- Get the PEB of the current process.
- imm.getPEBaddress():
- Returns the DWORD address of the current process's PEB.
- imm.getAddress(expression)
- Gets the address of expression (which is a string)
- Ex: imm.getAddress("kernel32.Process32FirstW") -> returns the address of Process32FirstW which is used to iterate though available processes currently running on the system in case your interested ;)
Okay that should be enough for you to get most scripts done. If you need to write to a file at any time, the process is the same as you would do in a normal python script.
Some Example Scripts From Grey Hat Python
Again I claim no credit for these. They are all the work of Justin Setiz and all credit goes to him for creating these except for one which I will mention shortly.
badchar,py
*BEGIN CODE SEGMENT*
from immlib import *
def main(args):
imm = Debugger()
bad_char_found = False
# First argument is the address to begin our search
address = int(args[0],16)
# Shellcode to verify
shellcode = "<INSERT SHELLCODE HERE>"
shellcode_length = len(shellcode)
debug_shellcode = imm.readMemory( address, shellcode_length )
debug_shellcode = debug_shellcode.encode("HEX") # We need to encode the debug_shellcode from assembly into hex format so that we can compare it to
# the shellcode we inserted just above here.
imm.log("***************************************")
imm.log("Address: 0x%08x" % address)
imm.log("Shellcode Length: %d" % shellcode_length)
#Begin a byte by byte comparison of the two shellcode buffers
count = 0
while count < shellcode_length:
if debug_shellcode[count] != shellcode[count]:
imm.log("Bad Char Detected at offset %d" % count)
bad_char_found = True
break
count += 1
if bad_char_found:
imm.log("[*****]")
imm.log("Bad char found %s" % debug_shellcode[count])
imm.log("Expected to find: %s" % shellcode[count])
imm.log("[*****]")
else:
imm.log("[*****]")
imm.log("No bad characters found :) Your good to go!")
imm.log("[*****]")
return "[*] !badchar finished, check Log window."
*END CODE SEGMENT*
Defeat IsDebuggerPresent (for use against malware)
This is the only piece of code that is mine. The creator of this technique was Damian Gomez of Immunity.
*BEGIN CODE SEGMENT*
from immlib import *
def main(args):
imm = Debugger()
# This is the initial test to see what it was before:
result = imm.readMemory( imm.getPEBAddress() + 0x2, 1 )
# At PEB + 0x2 in a process is the BeingDebugged variable which is what
# the function IsBeingDebugged returns. If we set this to 0 then
# IsBeingDebugged is tricked into thinking that the process is not being
# debugged because hey, thats what the process is reporting right?
# And thats one of many ways to get around anti-debugging techniques.
result = result.encode("HEX")
imm.log("Before the change: %s" % result)
#Make the change
imm.writeMemory( imm.getPEBAddress() + 0x2, "\x00" )
# And print the new results
result = imm.readMemory( imm.getPEBAddress() + 0x2, 1 )
result = result.encode("HEX")
imm.log("Result after change: %s" % result)
return "!defeatDebuggerPresent is done."
*END CODE SEGMENT*
findantidep.py
Included by default in Immunity Debugger. This is a GUI program that takes you through the process of disabling DEP on a specific process you are debugging and then returning execution to the area of code your shellcode is in. I will let you figure out how to use this because your probably smart enough to figure it out yourself if you have a need to use it (and space. may make separate tutorial on it as its an entire tutorial in itself to be honest)
End
Thats all fokes. Hopefully you can continue to use the examples given above in combination with the API guide to create some awesome scripts. And if you create something really awsome, let me know and if its good i'll post it up on here along with your name :)
And im out mates
-tekwizz123
May I know why do I get "Failed to execute script!" from PyCommand? Kinda sucks. Btw, I am using Windows XP installed in Virtualbox.
ReplyDeleteHello there,
DeleteDid you drop the script into "C:\Program Files (x86)\Immunity Inc\Immunity Debugger\PyCommands"? Also are you sure you are using Python 2.7 and not Python 3.x which the script might not be compatible with? Can I ask that you post which script you are trying to run? Happy to help if this still doesn't work out for you.
Additionally when the "Failed to execute script!" error occurs, most of the time it displays a traceback. Would you be able to post this at it would help me determine what the error is related to?
DeleteThanks for the reply. At first, I suspected that there are some compatibility issues between Python 2.7 and the Immdbg because the stable version of Immdbg preceded Python 2.7 for few years. So, I decided to give Python 2.6 a try, but still the same problem.
DeleteHere's the script I extracted from the book, Practical Malware Analysis.
#!/usr/bin/env python
import immlib
def main():
imm = immlib.Debugger()
imm.setBreakpoint(0x00401875)
imm.Run()
cfile = open("C:\\temp062da212",'rb')
buffer = cfile.read()
sz = len (buffer)
membuf = imm.remoteVirtualAlloc(sz)
imm.writeMemory(membuf,buffer)
regs = imm.getRegs()
imm.writeLong(regs['EBP']-12, membuf)
imm.writeLong(regs['EBP']-8, sz)
imm.setBreakpoint(0x0040190A)
imm.Run()
Then, I suspected there may be something wrong with the code, so I just tried to run the first few instructions.
import immlib
def main():
imm = immlib.Debugger()
imm.setBreakpoint(0x00401875)
imm.Run()
Even a simple breakpoint and run instruction didn't work too.
So, I tried to remove "#!/usr/bin/env python", it didn't work either.
Prior to this issue, when I was importing immlib to Python, I got some sort of message like "Failed to load DLL for debugger". Then I ran Debugger.pyd with Dependency Walker, I realized that Debugger.pyd couldn't find ImmunityDebugger.exe. Therefore, I decided to move the Libs and Pycommand folders as well as Debugger.pyd and ImmunityDebugger.exe under the same directory. The message disappeared after that, I could import the immlib as usual.
As for the traceback from failed execution, there's no traceback at all.
Thanks and Regards.
So I fixed your problem. Have no idea why Immunity is so borked at the moment but everything under the Debugger class seems to not work for me either at the moment.
DeleteTherefore I decided to rip the code from the Run() function as it was defined in immlib.py (which defines the Debugger class) and this seems to work fine.
Here is the final script:
#!/usr/bin/env python
__VERSION__ = '1.0'
import immlib
import getopt
import debugger
imm = immlib.Debugger()
def main(args):
imm.clearState()
debugger.run(0x00401875)
cfile = open("C:\\temp062da212",'rb')
buffer = cfile.read()
sz = len(buffer)
membuf = imm.remoteVirtualAlloc(sz)
imm.writeMemory(membuf,buffer)
regs = imm.getRegs()
imm.writeLong(regs['EBP']-12, membuf)
imm.writeLong(regs['EBP']-8, sz)
imm.clearState()
debugger.run(0x0040190A)
return "Done!"
Hope that helps :)
Thanks for the kind reply. It is really kind of you, I will give a try and update you.
DeleteSir, I want disassembly from the start to end of .exe file. Im getting search for instructions and disassembling those specific instructions but how to apply the same to all instructions. Disasm requires address to disassemble. How can i put a loop on all the addresses sequentially? Please help
ReplyDeleteI assume you are using Immunity Debugger here, in which case I would think that Immunity Debugger should be automatically disassembling the code for you? Is this not the case?
DeleteGiven Immunity Debugger is pretty much dead by this point I would strongly recommend moving on to more modern programs such as x64dbg or WinDbg.
With that out of the way if you still want to use Immunity Debugger I would recommend that you search the help docs (which have been removed from online access since Immunity Debugger is so old) and find a command which will grab you the base address of the program as well as the size of the program itself.
The main error that I see with your approach however is that the PE file will be a mix of code and data. Your approach assumes that everything in the PE file will be data so you will likely end up with incorrect disassembly as a result if you try process the entire PE file this way.
There may be a way around this by finding out the size of the code segment itself but this isn't really a complete fix to this issue, especially given that programs like IDA Pro use way more heuristics and detection methods to separate code, data, and strings from one another within a PE (aka its a lot of work).
Thankyou Sir. I want the python code actually of disassembling start to end addresses. Disasm requires address, instruction or opcode as an argument. I want to ask how i can get disassembly in a text file for every address.
DeleteI have tried IDA Pro also but couldnt get IDA Python plugin in its free version.
I have 20000 exe files to disassemble. Please suggest.
If not Immunity Debugger, how can i get disassembly in a file of the complete data section of an .exe file using python? Sorry, I'm new to this therefore understanding as reading blogs.
DeleteIn x64dbg*
DeleteSir, is there an updated link for online documentation? The old one in your article is no longer working.
ReplyDeleteNo, not that I am aware of, it seems they took the tool offline. Immunity Debugger is very old now and you are probably better off served by tools such as WinDbg or x64Dbg.
DeleteBut these two don't support scripts in Python, do they? I think it pretty handy to be able to write scripts using Python APIs.
DeleteNo they don't, although they do support other types of scripts.
DeleteBut these two don't support scripts in Python, do they? I think it pretty handy to be able to write scripts using Python APIs.
ReplyDelete