Numeric constants are placed in a code segment encoded in functional instructions. So you can try using magic numbers like 0xDEADBEEF etc.
those. here is a collapsible view of a simple C function with Visual C ++:
void foo(void) { 00411380 push ebp 00411381 mov ebp,esp 00411383 sub esp,0CCh 00411389 push ebx 0041138A push esi 0041138B push edi 0041138C lea edi,[ebp-0CCh] 00411392 mov ecx,33h 00411397 mov eax,0CCCCCCCCh 0041139C rep stos dword ptr es:[edi] unsigned id = 0xDEADBEEF; 0041139E mov dword ptr [id],0DEADBEEFh
You can see that 0xDEADBEEF turns it into a function source. Note that what you actually see in the executable depends on the CPU match (tx. Richard).
This is an x86 example. But RISC processors (MIPS, etc.) have instructions that move directly to the registers - these direct users can also have special recognized values (although only for 16-bit for MIPS, IIRC).
Psihodelia - It’s getting harder and harder for you to catch your intention. Is this just one feature you want to find? Then you can’t just post 5 NOPs one by one and look for them? Do you control the compiler / assembler / linker / loader? What tools are at your disposal?
source share