Linux tools
Throughout this book, we will be using a variety of free tools that are accessible by anyone. This section will give a brief synopsis of some of these tools for you.
GDB
GNU Debugger (GDB) is not only good to debug buggy applications. It can also be used to learn about a program's control flow, change a program's control flow, and modify the code, registers, and data structures. These tasks are common for a hacker who is working to exploit a software vulnerability or is unraveling the inner workings of a sophisticated virus. GDB works on ELF binaries and Linux processes. It is an essential tool for Linux hackers and will be used in various examples throughout this book.
Objdump from GNU binutils
Object dump (objdump) is a simple and clean solution for a quick disassembly of code. It is great for disassembling simple and untampered binaries, but will show its limitations quickly when attempting to use it for any real challenging reverse engineering tasks, especially against hostile software. Its primary weakness is that it relies on the ELF
section headers and doesn't perform control flow analysis, which are both limitations that greatly reduce its robustness. This results in not being able to correctly disassemble the code within a binary, or even open the binary at all if there are no section headers. For many conventional tasks, however, it should suffice, such as when disassembling common binaries that are not fortified, stripped, or obfuscated in any way. It can read all common ELF
types. Here are some common examples of how to use objdump
:
- View all data/code in every section of an
ELF
file:objdump -D <elf_object>
- View only program code in an
ELF
file:objdump -d <elf_object>
- View all symbols:
objdump -tT <elf_object>
We will be exploring objdump
and other tools in great depth during our introduction to the ELF
format in Chapter 2, The ELF Binary Format.
Objcopy from GNU binutils
Object copy (Objcopy) is an incredibly powerful little tool that we cannot summarize with a simple synopsis. I recommend that you read the manual pages for a complete description. Objcopy
can be used to analyze and modify ELF
objects of any kind, although some of its features are specific to certain types of ELF
objects. Objcopy
is often times used to modify or copy an ELF
section to or from an ELF
binary.
To copy the .data
section from an ELF
object to a file, use this line:
objcopy –only-section=.data <infile> <outfile>
The objcopy
tool will be demonstrated as needed throughout the rest of this book. Just remember that it exists and can be a very useful tool for the Linux binary hacker.
strace
System call trace (strace) is a tool that is based on the ptrace(2)
system call, and it utilizes the PTRACE_SYSCALL
request in a loop to show information about the system call (also known as syscalls
) activity in a running program as well as signals that are caught during execution. This program can be highly useful for debugging, or just to collect information about what syscalls
are being called during runtime.
This is the strace
command used to trace a basic program:
strace /bin/ls -o ls.out
The strace
command used to attach to an existing process is as follows:
strace -p <pid> -o daemon.out
The initial output will show you the file descriptor number of each system call that takes a file descriptor as an argument, such as this:
SYS_read(3, buf, sizeof(buf));
If you want to see all of the data that was being read into file descriptor 3, you can run the following command:
strace -e read=3 /bin/ls
You may also use -e write=fd
to see written data. The strace
tool is a great little tool, and you will undoubtedly find many reasons to use it.
ltrace
library trace (ltrace) is another neat little tool, and it is very similar to strace
. It works similarly, but it actually parses the shared library-linking information of a program and prints the library functions being used.
Basic ltrace command
You may see system calls in addition to library function calls with the -S
flag. The ltrace
command is designed to give more granular information, since it parses the dynamic segment of the executable and prints actual symbols/functions from shared and static libraries:
ltrace <program> -o program.out
ftrace
Function trace (ftrace) is a tool designed by me. It is similar to ltrace
, but it also shows calls to functions within the binary itself. There was no other tool I could find publicly available that could do this in Linux, so I decided to code one. This tool can be found at https://github.com/elfmaster/ftrace. A demonstration of this tool is given in the next chapter.
readelf
The readelf
command is one of the most useful tools around for dissecting ELF
binaries. It provides every bit of the data specific to ELF
necessary for gathering information about an object before reverse engineering it. This tool will be used often throughout the book to gather information about symbols, segments, sections, relocation entries, dynamic linking of data, and more. The readelf
command is the Swiss Army knife of ELF
. We will be covering it in depth as needed, during Chapter 2, The ELF Binary Format, but here are a few of its most commonly used flags:
- To retrieve a section header table:
readelf -S <object>
- To retrieve a program header table:
readelf -l <object>
- To retrieve a symbol table:
readelf -s <object>
- To retrieve the
ELF
file header data:readelf -e <object>
- To retrieve relocation entries:
readelf -r <object>
- To retrieve a dynamic segment:
readelf -d <object>
ERESI – The ELF reverse engineering system interface
ERESI project (http://www.eresi-project.org) contains a suite of many tools that are a Linux binary hacker's dream. Unfortunately, many of them are not kept up to date and aren't fully compatible with 64-bit Linux. They do exist for a variety of architectures, however, and are undoubtedly the most innovative single collection of tools for the purpose of hacking ELF
binaries that exist today. Because I personally am not really familiar with using the ERESI project's tools, and because they are no longer kept up to date, I will not be exploring their capabilities within this book. However, be aware that there are two Phrack articles that demonstrate the innovation and powerful features of the ERESI tools:
- Cerberus ELF interface (http://www.phrack.org/archives/issues/61/8.txt)
- Embedded ELF debugging (http://www.phrack.org/archives/issues/63/9.txt)