Disasm is a browser-based application, built on Flask, that allows you to disassemble ELF files into Intel x86 assembly. The assembly and analysis is displayed in a browser so that you can click around and interact with it.
- Install Capstone
- Install the dependencies
$ pip install -r requirements.txt --ignore-installed
- Replace the upload path and source code directory path in
config.py
with the appropriate relative paths on your machine.
There is optional IACA integration. To use it, you must first download IACA from Intel's website and update variables in your config.py accordingly.
PyPy is an alternative implementation of python that provides a considerable speedup. To use it, there is a little more setup involved.
- Set up the requirements for pypy using either of the following methods:
pip_pypy install -r requirements.pypy.txt
(regular pip doesn't install to a directory that pypy can find)- OR create a pypy virtualenv and
pip install -r requirements.pypy.txt
within that virtualenv
- Ensure that you have either
c++filt
orgc++filt
on your machine and in your$PATH
. The demangler library we use does not work with pypy so we use command line tools instead. If you know of a python demangler library that can run on pypy, please let us know!
You can run the application with
python run.py
This will run the server on top of Gunicorn, a faster, more reliable, and more robust server than Werkzeug, the default Flask server. If Gunicorn isn't working for you, or if you'd like to use Werkzeug for any other reason, you can do so by running:
python app/app.py
If Pypy is installed, then you can run the application by running pypy instead of python:
pypy run.py
- -f <file(s)>, --files <file(s)>
- File(s) that you want to disassemble.
Features marked with an asterisk (*) require that the .dwarf_info section be defined in order to use it.
The main feature of the application, an ELF executable can be disassembled into x86 assembly and displayed in the browser.
After selecting a line of assembly, the source code that corresponds to it can be displayed, as well as the full stack trace of function calls that refer to it.
Note: This feature requires that the source directory of the code that compiled into this executable be defined in config.py.
A sequence of instructions can be analyzed by Intel IACA.
Note: In order to use this feature, you must first download IACA from Intel's website and update variables in your config.py accordingly.
Whenever possible, the contents of a register will be displayed, including the object's member that is being pointed to if a valid offset is given.
Observe which instructions read and/or write to a particular register by right clicking on the desired register and selecting the appropriate option from the dropdown menu.
Instructions that write to a flag(s) will display a white flag next to the mnemonic. Instructions that read from a flag(s) will display a black flag next to the mnemonic. Hovering over the flag will display which flags are read to/written from in this operation.
Jump tables are parsed. Clicking on the jump table instruction displays the mapping between each condition value and the address to jump to. Clicking on each of these addresses jumps to the respective instruction.
A rip-relative adddress (e.g, rip + 0x129d866
) can be resolved into a single address by right clicking on that part of the instruction. The value at this address can also be read from the file as an 8/16/32/64-bit signed decimal/unsigned decimal/hexadecimal/binary number, single/double precision floating point number, or null-terminated C String (up to 128 bytes).
You can search for a type that is defined in this file in order to obtain obtain in-depth information about this type, including its size, subtype, and member variables. When displaying member variables, you can also see their types, their offsets, and their name.
Clicking on the address of a jump or call instruction will allow you to jump to the address.
By right clicking on an immediate value, you can convert it to/from decimal (signed and unsigned), hexadecimal, and binary. If the number is less than 128 in unsigned decimal, then it can also be converted to ASCII.
Hovering over an instruction mnemonic will display a short explaination of what it does. Clicking on an instruction mnemonic will display an in-depth explaination.
When a file is uploaded, it will be stored on the server for quicker lookup later. These files can also be deleted.
NOP operations (which are essentially meaningless) are replaced with the size of the NOP.
- Up/down: Navigate through the list of functions
- Enter: Disassemble the currently selected function
- ?: Display the help menu
- Up/down: Navigate through the instructions
- Right Arrow
- On jmp/call: Go to target address
- On ret: Return to the calling function (only available if this function was reached by entering going through a call instruction)
- Left Arrow
- Undo previous jump/call (if applicable)
- Enter: Open the analysis window relevant to this instruction
- Shift + up/down: Go up/down the function stack
- Tab: Cycle through the analysis tabs
- Escape: Close the analysis window
If you find any bugs, please contact hareldan95@gmail.com
or dorothchen@gmail.com
with as much of the following information as possible:
- Version of python being run
- Source code language and version
- A link to download the executable, along with the name of the function that prodeced the bug.
- If an error/exception was raised, then the full stack trace of the error/exception.
- The browser and version of the browser being used.
- Anything else you think might be relevant.
- Dorothy Chen
- Dan Harel
Copyright 2016 MongoDB Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.