segunda-feira, 3 de março de 2014

ODA, Online DisAssembler, é um disassembler online que tem como objetivo principal, como o nome indica, desassemblar código máquina de vários tipos de arquiteturas.

Construído sobre libbfd e libopcodes (parte do binutils), ODA permite explorar executáveis dissecando as secções, strings, símbolos, hex e instruções ao nível da máquina.

Pode ser utilizado com vários propósitos, sendo as utilizações mais comuns:

  • Análise de Malware
  • Pesquisa de Vulnerabilidades
  • Visualizar o fluxo de instruções
  • Reverter os primeiros bytes de um MBR (Master Boot Record) corrompido
  • Debug de um sistema embebido
  • Ou simplesmente para satisfazer curiosidade
Listagem das arquiteturas suportadas:

aarch64
alpha
alpha:ev4
alpha:ev5
alpha:ev6
arc
arc5
base
arc6
arc7
arc8
arm
armv2
armv2a
armv3
armv3m
armv4
armv4t
armv5
armv5t
armv5te
xscale
ep9312
iwmmxt
iwmmxt2
avr
avr:1
avr:2
avr:25
avr:3
avr:31
avr:35
avr:4
avr:5
avr:51
avr:6
avr:101
avr:102
avr:103
avr:104
avr:105
avr:106
avr:107
bfin
cr16
cr16c
cris
crisv32
cris:common_v10_v32
crx
d10v
d10v:ts2
d10v:ts3
d30v
dlx
epiphany32
epiphany16
fr30
frv
tomcat
simple
fr550
fr500
fr450
fr400
fr300
h8300
h8300h
h8300s
h8300hn
h8300sn
h8300sx
h8300sxn
h8500
hppa1.1
hppa2.0w
hppa2.0
hppa1.0
i370:common
i370:360
i370:370
i386
i386:x86-64
i386:x64-32
i8086
i386:intel
i386:x86-64:intel
i386:x64-32:intel
i860
i960:core
i960:mc
i960:xa
i960:ca
i960:jx
i960:hx
ia64-elf64
ia64-elf32
ip2022ext
ip2022
iq2000
iq10
k1om
k1om:intel
l1om
l1om:intel
lm32
m16c
m32c
m32r
m32rx
m32r2
m68hc11
m68hc12
m68hc12
m9s12x
m9s12xg
m68k
m68k:68000
m68k:68008
m68k:68010
m68k:68020
m68k:68030
m68k:68040
m68k:68060
m68k:cpu32
m68k:fido
m68k:isa-a:nodiv
m68k:isa-a
m68k:isa-a:mac
m68k:isa-a:emac
m68k:isa-aplus
m68k:isa-aplus:mac
m68k:isa-aplus:emac
m68k:isa-b:nousp
m68k:isa-b:nousp:mac
m68k:isa-b:nousp:emac
m68k:isa-b
m68k:isa-b:mac
m68k:isa-b:emac
m68k:isa-b:float
m68k:isa-b:float:mac
m68k:isa-b:float:emac
m68k:isa-c
m68k:isa-c:mac
m68k:isa-c:emac
m68k:isa-c:nodiv
m68k:isa-c:nodiv:mac
m68k:isa-c:nodiv:emac
m68k:5200
m68k:5206e
m68k:5307
m68k:5407
m68k:528x
m68k:521x
m68k:5249
m68k:547x
m68k:548x
m68k:cfv4e
m88k:88100
MCore
mep
h1
c5
mips
mips:3000
mips:3900
mips:4000
mips:4010
mips:4100
mips:4111
mips:4120
mips:4300
mips:4400
mips:4600
mips:4650
mips:5000
mips:5400
mips:5500
mips:6000
mips:7000
mips:8000
mips:9000
mips:10000
mips:12000
mips:14000
mips:16000
mips:16
mips:mips5
mips:isa32
mips:isa32r2
mips:isa64
mips:isa64r2
mips:sb1
mips:loongson_2e
mips:loongson_2f
mips:loongson_3a
mips:octeon
mips:octeon+
mips:octeon2
mips:xlr
mips:micromips
mmix
mn10200
mn10300
am33
am33-2
msp:14
msp:11
msp:110
msp:12
msp:13
msp:14
msp:15
msp:16
msp:21
msp:31
msp:32
msp:33
msp:41
msp:42
msp:43
msp:44
ms1
ms1-003
ms2
ns32k:32032
ns32k:32532
openrisc
or32
pdp11
powerpc:common64
powerpc:common
powerpc:603
powerpc:EC603e
powerpc:604
powerpc:403
powerpc:601
powerpc:620
powerpc:630
powerpc:a35
powerpc:rs64ii
powerpc:rs64iii
powerpc:7400
powerpc:e500
powerpc:e500mc
powerpc:e500mc64
powerpc:MPC8XX
powerpc:750
powerpc:titan
powerpc:vle
powerpc:e5500
powerpc:e6500
rs6000:6000
rs6000:rs1
rs6000:rsc
rs6000:rs2
rl78
rx
rx
s390:31-bit
s390:64-bit
score7
score3
sh
sh2
sh2e
sh-dsp
sh3
sh3-nommu
sh3-dsp
sh3e
sh4
sh4a
sh4al-dsp
sh4-nofpu
sh4-nommu-nofpu
sh4a-nofpu
sh2a
sh2a-nofpu
sh2a-nofpu-or-sh4-nommu-nofpu
sh2a-nofpu-or-sh3-nommu
sh2a-or-sh4
sh2a-or-sh3e
sh5
sparc
sparc:sparclet
sparc:sparclite
sparc:v8plus
sparc:v8plusa
sparc:sparclite_le
sparc:v9
sparc:v9a
sparc:v8plusb
sparc:v9b
spu:256K
tms320c30
tms320c4x
tms320c3x
tms320c54x
tic6x
tic80
tilegx
tilegx32
tilepro
v850
v850e2v3
v850e2
v850e1
v850e
vax
w65
we32k:32000
xstormy16
xtensa
xc16x
xc16xl
xc16xs
xgate
z80-any
z80-strict
z80
z80-full
z8001
z8002

Link para ODA: http://www.onlinedisassembler.com/odaweb/

Leave a Reply

Subscribe to Posts | Subscribe to Comments

Labels

Question Dump A30-327 ACE AccessData AccessData ACE AccessData Certified Examiner AccessData FTK FTK Segurança da Informação Software (ISC)² CISSP Certified Information System Security Professional Preparação para Certificação Browsers Ferramentas Windows Análise Forense Microsoft OSINT Ouya Redes Android Malware Open Source Open Source Intelligence Sysinternals Sysinternals Live Sysinternals tools Cache Cookies Fingerprint Games Internet Explorer Mozilla Firefox Notícia Pentesting Python Script Skype Vulnerabilidades .dd .net 3.5 1Z0-144 ARPwner AccessChk v5.11 AccessEnum v1.32 Auburn Base de Dados Bypass C# CERT CISP CMS CSIP Canonical Centro de Cibersegurança China China Software and Integrated Chip Promotions Ciência Forense Computacional Cloud Creepy Cyber Security Information Sharing Partnership Código Dev Developer Disassembler Exploits FOCA Favorites Fingerprinting Organizations with Collected Archives Firefox Foundstone FoxOne Scanner Futuremark GCHQ Galleta GameInformer Gamepop Gaming Geolocalization Github Gmail Google Chrome Hardware Hash Hotmail IDS IP IPS JSON Javascript Object Notation Format Kaspersky Lab Kon-boot Live View MAC OSX MAC OSX Bypass MI5 Malware Bancário McAfee labs Microsoft Office Mozilla Foundation Msiecfexport Netflix Nirsoft Nmap Notepad++ ODA Online DisAssembler Oracle Oracle 11G Oryon C Oryon C Portable Outlook Ouya Specs PL/SQL Pasco Passwords Phishing Poisoning Programar Programação RAW RPC Republica Popular da China SQL SQLite Sandbox Sandboxie Scan Security Meeting ShadowSEC Skype Log Viewer Smartphones SmoothSec Startup Terdot The Verge Timestamp Trojan UK Ubuntu UbuntuKylin OS Userrole Virtualização WIFI WebApp Webmails Windows Bypass Windows Registry Write Blocker XML Yahoo Zeus hash-identifier iFixIt index.dat profiles.ini sqlite3 th3j35t3r wig

Posts + Vistos

Com tecnologia do Blogger.