text section but, you are free to create additional sections for code or data in your program. Your program’s code usually ends up in the. In order to easily identify which parts of the application we want secured, we will be pushing them into a special section within the ELF file. The secured application will also need a couple of functions (the so-called stub) to decrypt at run-time the secured parts. We will have to write a small program that will encrypt parts of the application we want to secure (we will name this the off-line crypter). As usual I will use the classical XOR encoder so we do not spend time talking about cryptography and we can focus on the crypter itself. This technique allows you to crypt parts of your application using whatever algorithm you want. I will first briefly describe how the system works and then present you a possible implementation. The technique I’m going to present is pretty simple and can only secure relatively small parts of the binary. So, by now, you should know enough to build such a crypter for GNU/Linux, following what my colleagues have already explained to you. There are no big differences compared to what has already been said in this community. I had tried to make a twist of the original paper, but… to be honest, it is difficult to come up with something simpler. ![]() ![]() This post is kind of based on something else I wrote some months ago for a different community. As has explained us how to write a crypter for Windows, and has done the same for C#, I’m going to talk about how to build similar stuff for GNU/Linux.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |