This year, we have examined the plugins of 9 contestants, of wildly varying scopes & focus. The overall quality of this edition was very high, and many entries stood out, each one on different points.
The choice was difficult, but we finally picked the following winners:
Congratulations to the winners!
Below is the full list of submissions:
ActionScript 3 is:
... an ActionScript 3 processor module and Flash debugger plugin.
The submission from Boris Larin of Kaspersky Labs is actually three-in-one: a loader, processor module, and a debugger helper plugin.
It helps analyzing and debugging Adobe Flash flies. Although Flash has a planned End-Of-Life in 2020, it still remains a popular target for exploits and is still availble for most browsers.
We've already had an Adobe Flash disassembler submission back in 2009 (our first contest!) but that plugin only supported ActionScript2 and it has not been ported to IDA 7.0 which limits its usability.
The new loader/processor module from Boris supports ActionScript3 which is much more common nowadays and transparently loads compresssed files (CWS signature) which required manual decompression with the old one. In addition, there is a debugger helper plugin which allows the user to debug JITted *native code* generated by the Flash runtime from the bytecode methods and also adds comments with the original bytecode for easier understanding. This plugin will be very useful for anyone analyzing Flash exploits in malware. Impressive work from Boris!
... an IDA Pro plugin to examine the heap (glibc malloc implementation), focused on exploit development.
HeapViewer is a plugin to examine the heap of a process running under Linux, specifically glibc's heap management implementation.
It is a great tool for exploit development (its primary purporse), and also for learning how glibc's heap management is implemented.
The plugin provides an organized and in-depth view of the structures being used by glibc to manage the heap. HeapViewer looks like a great tool to have during CTF challenges.
It integrates well with IDA's debugging API to implement a tracer for memory-related functions.
HeapViewer is focused on exploit development, but it could be expanded to provide more memory-related analysis functionalities.
Deobfuscating Decompiler Plugin is:
... a Hex-Rays microcode API plugin breaking an obfuscating compiler used to create an in-the-wild malware family. The plugin is fully automatic and requires no user intervention; upon installation, the decompilation listings presented to the user will be free of obfuscation.
HexRaysDeob is not a large plugin, less than 4000 lines of C++ code but it performs a very complex task of handling heavily obfuscated code. It uses the decompiler's microcode API to automatically detect obfuscated functions, to remove the opaque predicates, and to unflatten the control flow.
In the current state the plugin handles one specific malware but can be relatively easily generalized to detect similar obfuscation techniques and remove them. In general, it detects a switch and a loop that are used to artificially flatten the control flow:
and removes them, so that we have nice control flow:
The plugin will be extremely useful to all persons interested in the microcode API because it is thouroughly commented.
... a plugin to create pattern-matching rules.
Hyara is a plugin created by Yi Hyun and Kwak Kyoung-ju.
It helps creating rules for the YARA pattern-matching tool direcly in IDA. It includes a simple detection of relocatable bytes in x86 opcodes for improved matching. It also provides a checker feature for testing the rules on the loaded binary.
... a fuzzy search tool for IDA Pro. This tool helps you to find command/function/struct and so on. This tool is inspired by Mac's Spotlight and Intellij's Search Everywhere dialog.
The tool is simple and works as advertized. This global search feature is more and more implemented in various softwares, and this plugins makes it available from IDA. Solid foundations are there and the plugin is already useful and usable, especially as it can be operated with the keyboard. There is still room for improvement though.
... a plugin for IDA Pro that assists a user with scripting the IDAPython plugin that is bundled with the disassembler. This plugin groups the different aspects of the IDAPython API into a simpler format which allows a reverse engineer to script different aspects of their work with very little investment.
IDA-Minsc is a big Python plugin, and Python zealots will like it! First, because it is written in Python, and second, it makes many things much more Pythonic than they were initially. IDA initially exposes C++ like API, which is too wordy and cumbersome for everyday hacking. IDA-Minsc introduces very short and handy functions and classes to overcome this shortcoming, and it looks neat! For example, instead of writing
you just write
and it will conveniently use some reasonable defaults.
It also introduces 'tags', which can be used to store and retrieve arbitrary info in the database as comments. The user can use various tags to mark a subset of functions and perform operations on them. By the way, all comments become searchable because of this feature. Think of it as about a small database inside idb, implemented on top of function and instruction comments.
The plugin comes with extensive documentation and has tutorials. It is a mature plugin, and will be useful in everyday work. We liked this plugin, it is very simple to install and definitely can make the user's life much easier.
... a collaborative reverse engineering plugin for IDA Pro and Hex-Rays.
On one hand, this is yet another attempt to solve the problem of multiple users working on the same database. On the other hand, this plugin can really be useful if deployed and used correctly. Due to the architecture of IDA it is very difficult to keep all database copies in sync:
Nevertheless, with some discipline, multiuser work is still possible with a plugin like IDArling. Say, introduce the following user policy: one copy of IDA is denoted as the main (may I say "master"?) copy, and only this copy of IDA will save the database to the server. Work of other users won't be lost because their changes are instantaneously copied to the main IDA.
We liked the way the plugin works. It shows the current address of other users in the navigation band and in the disassembly. This helps users to know where other users are and organize their work to avoid clashes (for example, to avoid renaming the same function simultaneously).
Since this is the version 0.0.1 of the plugin, there are many shortcomings but hopefully they will be fixed as time goes. Even in the current state the plugin can be useful.
... an IDA Pro processor module for Altera Nios II Classic/Gen2 microprocessor architecture.
The NIOS II processor module plugin by Anton Dorfman does exactly what you would expect it to do.
This plugin is written in Python and implements a complete processor module for the NIOS II Altera softcore, including pseudo-instruction simplification, stack variables, offsets relative to the global pointer, custom instructions, cross-references, switch detection, and many other features.
The code is well written and can be easily modified if your softcore contains extra custom instructions.
Usage is very straight-forward. Just copy the file to your "procs/" directory and, in the file loading dialog, select "Altera Nios II Classic/Gen2 Processor". IDA's ELF loader does not implement the particularities of this machine (such as relocations), but it can nonetheless load the files if the processor module is selected.
This plugin is of great benefit for people working with Altera's FPGAs. Perhaps now a NIOS II debugger could be written as well.
... a plugin analyzing the current function to find the usage frame of registers.
Oregami eases the work when tracking the use of a register within a function, by limiting the search to occurrences related to the one currently highlighted instead of the whole function. It provides handlers for PPC and ARM processors (the design is modular enough for others to be implemented), while more generic routines handle other CPU types, but with poor results. The approach taken by the module is quite simplistic and can fail on some complex cases.
As always, many thanks to all the participants for their useful and interesting submissions. We are looking forward to the next contest!
The usual disclaimer
Please be aware that all files come from third parties. While we did our best to verify them, we can not guarantee that they work as advertised, so use them at your own risk.
For the plugin support questions, please contact the authors.Date: September 21st, 2018