Talk:Skype Protocol
From Wikipedia, the free encyclopedia
[edit] Tools used
Baset and Schulzrinne used:
Biondi and Desclaux used:
- PytStop to circumvent checksums
- Skype checks for SoftICE to prevent debugging. However RR0d debugger works.
- Scapy interactive packet manipulation program
- shellcode Oracle Revelator in Shellforge
- IPQUEUE
- SIRINGE
- Skypy : a scapy wrapper to reassemble and decode obfuscated TCP streams (not released?)
[edit] Techniques used to defend the Skype binary
Skype relies heavily on code obfuscation:
- Much of the skype binary is encrypted. It provides its own unpacker which erases the original import table as it is loaded.
- Code integrity checksums, executed randomly, and obfuscated with random lengths and random operators
- Anti-debuggers
- attempt to identify breakpoints and trap the debugger.
- target specific debuggers by checking for certain loaded drivers
- General code obfuscation with fake error handlers that directly manipulate memory and registers. —The preceding unsigned comment was added by Pgr94 (talk • contribs) 14:11, 7 December 2006 (UTC).