forked from scanmem/scanmem
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathscanmem.1
532 lines (448 loc) · 17.4 KB
/
scanmem.1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
.TH scanmem 1 "2018-06-13" "scanmem-0.18"
.SH NAME
scanmem \- locate and modify variables in an executing process.
.SH SYNOPSIS
.B scanmem
.RB [options]
.IR [target-program-pid]
.SH DESCRIPTION
.B scanmem
is an interactive debugging utility that can be used to isolate the address of a variable
in an executing process by successively scanning the process' address space looking for
matching values.
.br
.RB "By informing " scanmem
how the value of the variable changes over time, it can determine the actual location (or
locations) of the variable by successively eliminating non-matches.
.br
.BR scanmem " determines where to look by searching for mappings with
.IR read "/" write
permission, these are referred to as regions. Users can eliminate regions they believe are
likely unrelated to the target variable (for example, located in a shared library unrelated to
the variable in question), this will improve the speed of the scan, which can initially be quite
slow in large programs.
Once a variable has been found,
.B scanmem
can monitor the variable, or change it to a user specified value, either once, or continually
over a period of time.
.B scanmem
.RI "works similarly to the \(dq" pokefinders "\(dq once commonly used to cheat at video games,"
this function is a good demonstration of how to use
.BR scanmem ", and is used in the documentation."
.SH USAGE
.B scanmem
should be invoked with the process id of the program you wish to debug as an argument.
.RB "Once started, " scanmem " accepts interactive commands.
These are described below, however entering
.BR help " at the
.BR > " prompt will allow you to access
.BR scanmem "'s online documentation.
.RI The " target-program-pid
can be specified in decimal, hexadecimal, or octal using the standard C language notation
(leading 0x for hexadecimal, leading 0 for octal, anything else is assumed to be decimal).
.TP
.BI "\-p, \-\-pid=" pid
Set the
.IR "target-program-pid".
.TP
.BI "\-c, \-\-command=" cmd1[;cmd2][;...]
Run given commands (separated by ";") before starting the interactive shell.
.TP
.B "\-v, \-\-version"
Print version and exit.
.TP
.B "\-h, \-\-help"
Print a short description of command line options then exit.
.TP
.B "\-d, \-\-debug"
Run in debug mode, more information will be outputted.
.TP
.B "\-e, \-\-errexit"
Exit on initial commands error, ignored during interactive mode.
.SH COMMANDS
While in interactive mode,
.BR scanmem " prints a decimal number followed by " > ", the number is the current number of"
possible candidates for the target variable that are known. The absence of said number
indicates that no possible variables have been eliminated yet.
.br
The default scan data type is "int".
.RB "It can be changed with the " option " command."
.TP
.B n
Where
.B n
represents any number in decimal, octal or hexadecimal, this command tells
.B scanmem
that the current value of the target variable is exactly
.BR n "."
.B scanmem
will begin a search of the entire address space, or the existing known matches (if any),
eliminating any variable that does not have this value.
.TP
.B n..m
This is like the
.B n
command but
.B scanmem
searches for a range of numbers between
.B n
and
.B m
inclusive instead.
.TP
.BR ">", " <", " +", " -", " =", " !="
The following commands are extremely useful for locating a variable whose
exact value we cannot see, but we can see how it changes over time, e.g. an health bar.
These commands usually cannot be used for the first scan but there are some exceptions:
.BR "> " n, " < " n, " = " "n and" " != " n.
.RS
.TP
.BI "> " [n]
.RI "If " n " is given, match values that are greater than " n "."
.RB "Otherwise match all values that have increased."
.TP
.BI "< " [n]
.RI "If " n " is given, match values that are less than " n "."
.RB "Otherwise match all values that have decreased."
.TP
.BI "+ " [n]
.RI "If " n " is given, match values that have been increased by " n "."
.RB "Otherwise match all values that have increased (same as " > ")."
.TP
.BI "- " [n]
.RI "If " n " is given, match values that have been decreased by " n "."
.RB "Otherwise match all values that have decreased (same as " < ")."
.TP
.BI "= " [n]
.RI "If " n " is given, match values that are equal to " n "
.RB "(same as " n "). Otherwise match all values that have not changed."
.TP
.BI "!= " [n]
.RI "If " n " is given, match values that are different from " n "."
.RB "Otherwise match all values that have changed."
.RE
.TP
.B snapshot
Match any value. This is useful when an initial value or range is not known for
subsequent scans with
.BR > ", " < ", " + ", " - ", " = ", and " != "."
.TP
.BI "\(dq " text
Search for the provided
.I text
in memory if the scan data type is set to "string".
.TP
.B update
Scans the current process, getting the current values of all matches. These values can be viewed with
.BR list ", and are also the old values that " scanmem " compares to when using"
.BR > ", " < ", or " = "."
This command is equivalent to a search command that all current results match.
.TP
.BI list " [max_to_print]
.RI "List up to " max_to_print " (default: " 10k ") possible candidates currently known,
including their address, region id, match offset, region type, last known value and possible value types.
The value in the first column is the match id, and can be used in conjunction with the
.B delete
command to eliminate matches.
The match offset is determined by subtracting the load address of the associated
ELF file or region from the address. It can be used to bypass Address Space Layout Randomization
(ASLR).
.TP
.BI delete " match-id_set
.RI "Delete matches in the " match-id_set ".
.RI "The " match-ids " can be found from the output of the
.BR list " command.
.RI "Set notation: " "[!][..a](,b..c | d, ...)[e..]".
.br
.RB "To delete all known matches, see the " reset " command.
.br
To delete all the matches associated with a particular library, see the
.BR dregion " command, which also removes any associated matches.
.br
Please note that match-ids may be recalculated after matches are removed or added.
.TP
.BI watch " match-id
Monitor the value of
.IR match-id ", and print its value as it changes. Every change is printed along with a timestamp,"
you can interrupt this command with ^C to stop monitoring.
.TP
.BI set " [match-id_set=]value[/delay] [...]
.RI "Set the value " value " into the match numbers specified in " match-id_set ",
.RI "or if just " value " is specified, all known matches."
.IR value " can be specified in standard C language notation.
All known matches, along with their match-id's can be displayed using the
.BR list " command.
.RI Multiple " match-id_set" "s can be specified, terminated with an " = " sign.
.RI "Set notation: " "[!][..a](,b..c | d, ...)[e..]".
.br
.RI "To set a value continually, suffix the command with " /
followed by the number of seconds to wait between sets. You can interrupt the set command
with ^C to return to the
.BR scanmem " prompt.
This can be used to sustain the value of a variable which decreases over time, for
example a timer that is decremented every second can be set to 100 every 10 seconds to
prevent some property from ever changing.
This command is used to change the value of the variable(s) once found by elimination.
Please note, some applications will store values in multiple locations.
.TP
.BI write " value_type address value
Manually set the value of the variable at the specified address.
.br
.RI "Names of " value_type
are subject to change in different versions of
.BR scanmem ","
see more info using the `help write` command.
.TP
.BI dump " address length [filename]
.RI "Dump the memory region starting from " address " of length " length
in a human-readable format.
.RI "If " filename " is given,
data will be saved into the file, otherwise data will be displayed on stdout.
.TP
.BI pid " [new-pid]
Print out the process id of the current target program, or change the target to
.IR new-pid ", which will reset existing regions and matches."
.TP
.B reset
Forget all known regions and matches and start again.
.TP
.B lregions
List all the known regions, this can be used in combination with the
.B dregion
command to eliminate regions that the user believes are not related to the variable in question,
thus reducing the address space required to search in. The value in the first column is the
.I region-id
which must be passed to the
.B dregion
command. Besides the start address, the size and path (if applicable) are also printed. This can be
used to eliminate regions located in shared libraries that are unlikely to be relevant to the
variable required.
For experts: Also the region type and the load address are displayed. The types are "exe" (executable)
"code" (library), "heap", "stack" or "misc" (everything else). The load address is the memory location
where an ELF file (exe/lib) has been loaded to. This helps to convert between the addresses in memory
and in the associated ELF file. If the region does not belong to an ELF file, then it is the same as
the start address.
.TP
.BI dregion " region-id_set
.RI "Delete the regions in " region-id_set ", along with any matches from the match list.
.RI "Set notation: " "[!][..a](,b..c | d, ...)[e..]".
.br
.RI "The " region-id "'s can be found in the output of the
.BR lregions " command.
.TP
.BI option " name value
Change options at runtime. E.g. the scan data type can be changed.
See `help option` for all possible names/values.
.TP
.BI shell " shell-command
.RI "Execute " shell-command " using /bin/sh, then return.
.TP
.BI show " info
Display information relating to
.I info
- see `help show` for details.
.TP
.B version
Print the version of
.B scanmem
in use.
.TP
.B help
Print a short summary of available commands.
.TP
.B exit
Detach from the target program and exit immediately.
.SH HISTORY
.RB "In interactive mode " scanmem " will retrieve the previous commands history
at startup and update it at closure.
.RI "The file used by default is " $XDG_CONFIG_HOME/scanmem/history " , which
.RI "will be " ~/.config/scanmem/history " under normal configurations.
.br
The maximum size of the history is currently 1000 lines.
.SH EXAMPLES
Cheat at nethack, on systems where nethack is not installed sgid.
.B ATTENTION: scanmem
usually requires root privileges. See
.B KNOWN ISSUES
for details.
.nf
$ sudo scanmem `pgrep nethack`
info: maps file located at /proc/14658/maps opened.
info: 9 suitable regions found.
Please enter current value, or "help" for other commands.
>
.fi
I enter how much gold I currently have (58 pieces) and let
.B scanmem
find the potential candidates.
.nf
> 58
01/09 searching 0x79f000 - 0x7b0000..........ok
02/09 searching 0x7b0000 - 0x7cc000..........ok
03/09 searching 0x24d2000 - 0x24f3000..........ok
04/09 searching 0x7fcc04baa000 - 0x7fcc04bae000..........ok
05/09 searching 0x7fcc04de1000 - 0x7fcc04de2000..........ok
06/09 searching 0x7fcc051f7000 - 0x7fcc051fb000..........ok
07/09 searching 0x7fcc05227000 - 0x7fcc0522a000..........ok
08/09 searching 0x7fcc0522c000 - 0x7fcc0522d000..........ok
09/09 searching 0x7ffc8c113000 - 0x7ffc8c134000..........ok
info: we currently have 16 matches.
16> list
[ 0] 7b09e0, 1 + 3b09e0, exe, 58, [I64 I32 I16 I8 ]
[ 1] 7b907a, 1 + 3b907a, exe, 58, [I8 ]
[ 2] 24d4b6c, 2 + 2b6c, heap, 58, [I16 I8 ]
[ 3] 24d567e, 2 + 367e, heap, 58, [I16 I8 ]
[ 4] 24d5740, 2 + 3740, heap, 58, [I8 ]
[ 5] 7fcc05229951, 6 + 2951, misc, 58, [I8 ]
[ 6] 7ffc8c12ee28, 8 + 1be28, stack, 58, [I16 I8 ]
[ 7] 7ffc8c132381, 8 + 1f381, stack, 58, [I8 ]
[ 8] 7ffc8c132389, 8 + 1f389, stack, 58, [I8 ]
[ 9] 7ffc8c132391, 8 + 1f391, stack, 58, [I8 ]
[10] 7ffc8c132399, 8 + 1f399, stack, 58, [I8 ]
[11] 7ffc8c1323a1, 8 + 1f3a1, stack, 58, [I8 ]
[12] 7ffc8c1323a9, 8 + 1f3a9, stack, 58, [I8 ]
[13] 7ffc8c1331a3, 8 + 201a3, stack, 58, [I8 ]
[14] 7ffc8c13325f, 8 + 2025f, stack, 58, [I8 ]
[15] 7ffc8c133264, 8 + 20264, stack, 58, [I8 ]
16>
.fi
16 potential matches were found. This is also displayed in the prompt.
Many of them are quite unrelated, as they are part of the stack, belong to libraries
or miscellaneous memory-mapped files. Even the heap is unlikely for a very old command
line game. We could make
.B scanmem
eliminate these manually using the
.B delete
command, however just waiting until the amount of gold changes and telling
.B scanmem
the new value should be enough. I find some more gold, and tell
.B scanmem
the new value, 83.
.nf
16> 83
\[char46].........info: we currently have 1 matches.
info: match identified, use "set" to modify value.
info: enter "help" for other commands.
1> list
[ 0] 7b09e0, 1 + 3b09e0, exe, 83, [I64 I32 I16 I8 ]
.fi
Only one of the 16 original candidates now has the value 83, so this must be where the
amount of gold is stored. I'll try setting it to 10,000 pieces.
.nf
1> set 10000
info: setting *0x7b09e0 to 0x2710...
1>
.fi
The resulting nethack status:
.nf
Dlvl:1 $:10000 HP:15(15) Pw:2(2) AC:7 Exp:1
.fi
Conclusion: We've found and modified the gold value as I32 in static memory of the executable
at virtual memory address 0x7b09e0. This address belongs to the region with id 1.
Now it is important to know if this is a position-independent executable (PIE). We list the
regions for this and check the load address of the executable.
.nf
1> lregions
[ 0] 79f000, 69632 bytes, exe, 400000, rw-, /usr/lib/nethack/nethack.tty
[ 1] 7b0000, 114688 bytes, exe, 400000, rw-, unassociated
[ 2] 24d2000, 135168 bytes, heap, 24d2000, rw-, [heap]
[ 3] 7fcc04baa000, 16384 bytes, misc, 7fcc04baa000, rw-, unassociated
[ 4] 7fcc04de1000, 4096 bytes, misc, 7fcc04de1000, rw-, unassociated
[ 5] 7fcc051f7000, 16384 bytes, misc, 7fcc051f7000, rw-, unassociated
[ 6] 7fcc05227000, 12288 bytes, misc, 7fcc05227000, rw-, unassociated
[ 7] 7fcc0522c000, 4096 bytes, misc, 7fcc0522c000, rw-, unassociated
[ 8] 7ffc8c113000, 135168 bytes, stack, 7ffc8c113000, rw-, [stack]
.fi
We are on x86_64 and 0x400000 is the static load address for executables there. This means
that this is not a PIE and the gold is always stored at 0x7b09e0. This makes it easy to
use a game trainer like GameConqueror which refills the gold value periodically.
With a PIE we have to use the match offset (0x3b09e0 here) instead and an advanced game trainer
with PIE support has to determine and add the current load address to it to get the current
memory address of the gold value of the current game run.
.SH NOTES
.B scanmem
has been tested on multiple large programs, including the 3d shoot-em-up quake3 linux.
.B scanmem
is also tested on ARM platforms and comes with Android support since version 0.16.
Obviously,
.B scanmem
can crash your program if used incorrectly.
Some programs store values in multiple locations, this is why
.B set
will change all known matches.
Address Space Layout Randomization (ASLR) together with position-independent executables
(PIE), position-independent code (PIC) or dynamic memory on the heap causes variables to
be loaded to different memory addresses at every game start. Advanced game trainers like
ugtrain are required to periodically refill variables is such memory regions.
.SH KNOWN ISSUES
.B scanmem
usually requires root privileges for
.BR ptrace (2)
because security modules control ptrace() capabilities. On x86 and x86_64 there is usually
the
.B Yama
security module providing the file
.IR /proc/sys/kernel/yama/ptrace_scope "."
It is available since Linux 3.4. If this file contains "1", then only parents may ptrace()
their children without root privileges. This means that
.B scanmem
would have to run the game. This is not possible as this would require major design
changes. So we run
.B scanmem
as root.
The first scan can be very slow on large programs, this is not a problem for subsequent
scans as huge portions of the address space are usually eliminated. This could be improved
in future, perhaps by assuming all integers are aligned by default. Suggestions welcome.
The
.B snapshot
command uses memory inefficiently, and should probably not be used on large programs.
The option
.B noptrace
which uses /proc/pid/mem could be replaced by process_vm_readv/process_vm_writev system calls instead.
.TP
.br
.B For more informations to this noptrace option:
.br
.br
For now it runs by reading/writing only to /proc/pid/mem if available without having ptrace attached to the process.
.br
This is useful if you want to have a debugger attached to the targeted process and scanmem behind.
.br
You must have a recent kernel (Linux >= 3.2.2) to run with this option,
.br
in order to have permissions to read/write to /proc/pid/mem.
.br
.br
.B Here is the details for the linux kernel if you want to know why:
.RS
.IP
.br
For linux kernel under versions 3.2.2,
.br
there was a check inside for the function(s) mem_read/mem_write,
.br
called previously check_mem_permission inside fs/proc/base.c,
.br
which needed ptrace permissions (process being attached to the targeted process).
.br
This has been removed after this version, and supported modifications to /proc/pid/mem directly with root.
.RE
.SH HOMEPAGE
https://github.com/scanmem/scanmem
.SH AUTHORS
Tavis Ormandy <taviso(a)sdf.lonestar.org> http://taviso.decsystem.org/
.br
Eli Dupree <elidupree(a)charter.net>
.br
WANG Lu <coolwanglu(a)gmail.com>
.br
Sebastian Parschauer <s.parschauer(a)gmx.de>
.br
Andrea Stacchiotti <andreastacchiotti(a)gmail.com>
All bug reports, suggestions or feedback welcome.
.SH SEE ALSO
gameconqueror(1)
ptrace(2)
proc(5)
nethack(6)
pidof(8)