Skip to main content

Questions tagged [system-call]

A way for an operating system to serve requests from user-space without breaking the user-space and kernel-space memory protection.

2 votes
0 answers
57 views

Not so long ago I was engaged in reverse and pwn, I came across such a task This is a normal task with a vulnerability on the heap, but it is striped and I don’t understand where which functions are I ...
K05t1K_RWX's user avatar
1 vote
0 answers
129 views

I'd like to use Miasm's DSE on a binary. This binary makes use of 2 syscalls: exit and ptrace. Miasm provides an implementation of some syscalls, but unfortunately, not of those two. So I tried to ...
Katoptriss's user avatar
0 votes
1 answer
154 views

in oder to solve a CTF-Challenge I have to construct a small ROP-chain. The scope of the ROP chain is to print the content of the `flag` file. I already constructed the ROP-chain, but it seems that ...
pekusbill's user avatar
3 votes
2 answers
974 views

I've been reading about the way syscalls are called in windows. The general theme in all the articles I read is: 64bit- called inside ntdll 32bit- from ntdll jumping to KiFastSystemcall but when I ...
Alal Benben's user avatar
1 vote
0 answers
79 views

I know that kernel modules are practically part of the kernel since it gets loaded inside it. But I am not sure if it really gets all privileges the system has. Can it read/write code inside the ...
M. Kalter's user avatar
1 vote
0 answers
3k views

I am writing a Pin tool with the following functionality: It has to record instructions with arguments. (works well) It has to record memory access operations associated with instructions. (works well)...
aGGeRReS's user avatar
  • 124
7 votes
1 answer
2k views

In windows platform, an application usually references its IAT(Import Access Table) to get the address of the APIs it wants, then call it. Then some mechanisms are done as demonstrated here nicely. ...
Hyeonseo Yang's user avatar
3 votes
0 answers
304 views

I have been looking into ntdll.dll on windows 10 x64 bit, and i noticed a check inside the ntdll like this: So after testing some bit, it tries to execute the system call via int 2eh. I have tried to ...
MaleFUnction0's user avatar
0 votes
2 answers
5k views

To my knowledge, this is a decent resource to know the parameters of a Linux syscall. However, this only lists 32 bit syscalls, not the 64 bit ones. Moreover, the reference doesn't say which register ...
sherlock's user avatar
  • 1,401
10 votes
2 answers
8k views

From this question: How does the Windows Native API communicate with the kernel? Here is an example of ZwClose(HANDLE Handle); system call in NTDLL.DLL in Windows 10 X86_64: NtClose proc near ...
Biswapriyo's user avatar
  • 1,589
1 vote
0 answers
77 views

I'm attaching to a simple program and the new thread breaks at DbgBreakPoint as expected. I'm using x64dbg (32-bit). The problem is, when I go to the Threads window it shows all the threads' EIPs as ...
Mikubyte's user avatar
  • 153
1 vote
2 answers
1k views

I have a binary which is playing a Morse code using calls to Beep & Sleep. This file is Windows PE32 exe which I open via Wine on my Ubuntu (16.04). How can I extract the arguments which passed ...
James W.'s user avatar
  • 283
1 vote
1 answer
2k views

What's the difference between an interrupt line and an interrupt number (like 0x80) ? Also how are IRQs related to syscalls?
Trey's user avatar
  • 447
10 votes
2 answers
21k views

I wonder if there some syscall table for Linux ARM64 architecture? I found syscall table for Linux ARM32 and many other architectures, but the problem still exists. Does anyone know where can I find ...
merrychap's user avatar
  • 103
9 votes
1 answer
18k views

The SYSCALL instruction is said to be the 64-bit version of INT 0X80, however it's still possible to use the latter in 64-bit code (although strace decodes it wrong because of the 64-bit ABI I guess) ...
Trey's user avatar
  • 447

15 30 50 per page