#!~/.wine/drive_c/Python25/python.exe # -*- coding: utf-8 -*- # Copyright (c) 2009-2014, Mario Vilas # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are met: # # * Redistributions of source code must retain the above copyright notice, # this list of conditions and the following disclaimer. # * Redistributions in binary form must reproduce the above copyright # notice,this list of conditions and the following disclaimer in the # documentation and/or other materials provided with the distribution. # * Neither the name of the copyright holder nor the names of its # contributors may be used to endorse or promote products derived from # this software without specific prior written permission. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE # ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE # LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE # POSSIBILITY OF SUCH DAMAGE. # $Id: 06_debug_events.py 1299 2013-12-20 09:30:55Z qvasimodo $ from winappdbg import Debug, HexDump, win32 def my_event_handler( event ): # Get the process ID where the event occured. pid = event.get_pid() # Get the thread ID where the event occured. tid = event.get_tid() # Find out if it's a 32 or 64 bit process. bits = event.get_process().get_bits() # Get the value of EIP at the thread. address = event.get_thread().get_pc() # Get the event name. name = event.get_event_name() # Get the event code. code = event.get_event_code() # If the event is an exception... if code == win32.EXCEPTION_DEBUG_EVENT: # Get the exception user-friendly description. name = event.get_exception_description() # Get the exception code. code = event.get_exception_code() # Get the address where the exception occurred. try: address = event.get_fault_address() except NotImplementedError: address = event.get_exception_address() # If the event is a process creation or destruction, # or a DLL being loaded or unloaded... elif code in ( win32.CREATE_PROCESS_DEBUG_EVENT, win32.EXIT_PROCESS_DEBUG_EVENT, win32.LOAD_DLL_DEBUG_EVENT, win32.UNLOAD_DLL_DEBUG_EVENT ): # Get the filename. filename = event.get_filename() if filename: name = "%s [%s]" % ( name, filename ) # Show a descriptive message to the user. print "-" * 79 format_string = "%s (0x%s) at address 0x%s, process %d, thread %d" message = format_string % ( name, HexDump.integer(code, bits), HexDump.address(address, bits), pid, tid ) print message def simple_debugger( argv ): # Instance a Debug object, passing it the event handler callback. debug = Debug( my_event_handler, bKillOnExit = True ) try: # Start a new process for debugging. debug.execv( argv ) # Wait for the debugee to finish. debug.loop() # Stop the debugger. finally: debug.stop() # When invoked from the command line, # the first argument is an executable file, # and the remaining arguments are passed to the newly created process. if __name__ == "__main__": import sys simple_debugger( sys.argv[1:] )