Open vinatgit opened 7 years ago
Hi,
You may want to take a look at the DSE module (miasm2.analysis.dse
) which runs a symbolic execution alongside a concrete one.
If I correctly understand your problem, you can:
apply_change
or symbolize_memory
)Then, you can either:
IRDst
becomes symbolic, it means that it depends on your input, the rest being only concrete).A blog post is on its way for this plug-in, it might be clearer :)
Hi I am trying to reverse engineer a binary that is available to me (which stores my input at some location and then checks that with a hardcoded string, and returns the output accordingly). I want to know if there is a functionality in Miasm that allows me to trace my input, run symbolic execution and solve the above mentioned problem.