checksec | Does large-scale package analysis
kandi X-RAY | checksec Summary
kandi X-RAY | checksec Summary
This is a rough port of the checksec.sh script by Tobias Klein to Python. My analysis code combines the original checksec (bash script), rpm-chksec (Steve’s script) and Grant’s Go port into one Python code base. The idea behind this exercise is to make analysis of packages easier and more accessible. One of the cool things is that you can analyze packages for different Operating System(s) seamlessly while running a single OS. Additionally, my code works for all RHEL and Fedora versions (and even deb based distributions). The analysis code doesn’t install any packages on the system, is host OS agnostic and is quite fast (scales linearly).
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Analyze a rpm file
- Determine whether the symbol is enabled
- Process an ELF file
- Return enabled tags
- Scan the given buffer
- Close the clamd socket
- Read the response from clamd
- Parse an HTTP response
- Load data files
- Load repositories
- List section
- List sections
- Analyze a package
- Fetch url to destination
- Query the server
- Receive a response from clamd
- Shutdown the Clamd
- Reload the server
- Test for a non - regression test
- Ping the server
checksec Key Features
checksec Examples and Code Snippets
Community Discussions
Trending Discussions on checksec
QUESTION
Currently I am studying system exploit, and find some interesting system exploit called buffer overflow using shellcode. I wrote shellcode terminating current process using exit(0) systemcall. Below, there is my code.
...ANSWER
Answered 2021-Aug-10 at 14:38The title says "execstack not applied at .rodata
, .data
, or .bss
sections".
That's correct:
execstack
is a linker flag that "Marks the object as requiring executable stack."
It does nothing about .data
, .bss
or .rodata
.
When I run your program (on x86_64), I get:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install checksec
You can use checksec like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page