cacti
Results 1 to 12 of 12

Thread: W*2Dasm Question

Threaded View

  1. #2
    Join Date
    Jan 2010
    Posts
    3
    In x86 assembly, when you write a (direct) jump or call, the jump target is specified as an offset from the address of the next instruction. For example:

    *000: jmp *020 ; => EB *E
    *002: ...

    Here, EB is the opcode for a short jmp, and *E is the offset from the following instruction (at *002) to the jump target (i.e., *E = *020 - *002).

    Another example:

    2000: jmp 2*00 ; => E* FD 00
    200*: ...

    Here, E* is the opcode for a near jmp, and 00FD is the offset from the following instruction (at 200*) to the jump target.

    (Indirect jumps do not use offsets. For example, jmp eax will use the contents of eax as the jump target, without adding the address of the next instruction.)
    _______________________________________________________
    Last edited by gordo; 01-31-2010 at 11:13 AM. Reason: spam links

Similar Threads

  1. W*2dasm revisited
    By OldJohnnyBoy in forum Programming
    Replies: 1
    Last Post: 07-06-2015, 11:59 AM
  2. question
    By darknight in forum Viruses and Trojans
    Replies: 1
    Last Post: 12-26-2008, 08:07 AM
  3. I can't open powered_keylogger.exe in w*2Dasm 8.**?
    By sneha in forum Security & Encryption
    Replies: 2
    Last Post: 05-07-2007, 02:40 AM
  4. question
    By Unregistered in forum Proxies and Firewalls
    Replies: 1
    Last Post: 08-03-2004, 03:56 PM
  5. Question
    By Unregistered in forum Internet Privacy
    Replies: 2
    Last Post: 04-21-2004, 10:18 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts