Skip to content

A C-based checksec without readelf or grep dependance.

License

Notifications You must be signed in to change notification settings

lockedbyte/protcheck

Folders and files

NameName
Last commit message
Last commit date

Latest commit

author
lockedbyte
Apr 20, 2021
ee3d008 · Apr 20, 2021

History

23 Commits
Aug 4, 2020
Jul 29, 2020
Apr 20, 2021
Apr 20, 2021
Jul 29, 2020
Aug 4, 2020
Apr 20, 2021

Repository files navigation

Protcheck 1.0.1 - @lockedbyte (https://github.com/lockedbyte/protcheck)

A C utility to check an ELF binary protections parsing the ELF directly instead of using intermediate programs like readelf or grep.

This tool checks for:
    - FORTIFY Source
    - NX
    - PIE
    - Canary
    - RELRO
    - Interesting imports like system or execve
    - Dangerous functions like gets()


Advantages of using C-based program instead of bash/python ones:
    - You do not depend on external programs like readelf or grep.
    - Avoid problems: If the program you are using changes it's output, or a user has a different language the results could get wrong.
    - Parsing the ELF file to check for those protections directly in C could let you understand how to find them manually and how the ELF works internally.
    - In some CTFs you need to use remote systems that do not have some programs like readelf or grep, using a non-dependant binary could help you to check the protections for the needed binaries


Installing:

    make
    sudo make install

About

A C-based checksec without readelf or grep dependance.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published