Binary Diffing
最后更新于
这有帮助吗?
最后更新于
这有帮助吗?
This section is based on the article ""
Without any parameters, radiff2
by default shows what bytes are changed and their corresponding offsets:
Notice how the two jumps are nop'ed.
For bulk processing, you may want to have a higher-level overview of differences. This is why radare2 is able to compute the distance and the percentage of similarity between two files with the -s
option:
If you want more concrete data, it's also possible to count the differences, with the -c
option:
If you are unsure whether you are dealing with similar binaries, with -C
flag you can check there are matching functions. It this mode, it will give you three columns for all functions: "First file offset", "Percentage of matching" and "Second file offset".
Moreover, we can ask radiff2 to perform analysis first - adding -A
option will run aaa
on the binaries. And we can specify binaries architecture for this analysis too using
Parts in yellow indicate that some offsets do not match. The grey piece means a perfect match. The red one highlights a strong difference. If you look closely, you will see that the left part of the picture has mov edi, 0x1; call sym.imp.exit
, while the right one has xor edi, edi; call sym.imp.exit
.
We have only shown the code analysis diffing functionality, but radare2 supports additional types of diffing between two binaries: at byte level, deltified similarities, and more to come.
We have plans to implement more kinds of bindiffing algorithms into r2, and why not, add support for ASCII art graph diffing and better integration with the rest of the toolkit.
And now a cool feature : radare2 supports graph-diffing, à la , with the -g
option. You can either give it a symbol name, of specify two offsets, if the function you want to diff is named differently in compared files. For example, radiff2 -g main /bin/true /bin/false | xdot -
will show differences in main()
function of Unix true
and false
programs. You can compare it to radiff2 -g main /bin/false /bin/true
(Notice the order of the arguments) to get the two versions. This is the result:
Binary diffing is an important feature for reverse engineering. It can be used to analyze , infected binaries, firmware changes and more...