|
You are here |
g-w1.github.io | ||
| | | | |
blog.nuculabs.dev
|
|
| | | | | Hello, In this article I'll present you my solution on the Chapter 5 CTF from the book Practical Binary Analysis. For this binary, the hint is to fix four broken things. Running file gives us the following response: 1 2 binary@binary-VirtualBox:~/ctf$ file ./lvl3 ./lvl3: ERROR: ELF 64-bit LSB executable, Motorola Coldfire, version 1 (Novell Modesto) error reading (Invalid argument) And the readelf command gives us: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 binary@binary-VirtualBox:~/ctf$ readelf -h ./lvl3 ELF Header: Magic: 7f 45 4c 46 02 01 01 0b 00 00 00 00 00 00 00 00 Class: ELF64 Data: 2's complement, little endian Version: 1 (current) OS/ABI: Novell - Modesto ABI Version: 0 Type: EXEC (Executable file) Machine: Motorola Coldfire Version: ... | |
| | | | |
blog.stalkr.net
|
|
| | | | | Sometimes I need to create a tiny ELF with some assembly code, because I'm restricted in size or just don't like the bloated binary produced... | |
| | | | |
wiki.osdev.org
|
|
| | | | | [AI summary] The provided text is an in-depth guide to understanding and implementing an ELF (Executable and Linkable Format) loader in low-level programming. It covers key concepts such as ELF headers, section headers, program headers, symbol tables, relocation entries, and the process of loading and executing ELF files. The text also includes code examples for parsing ELF headers, processing relocation entries, and handling memory mapping for segments. | |
| | | | |
offlinemark.com
|
|
| | | This post details my adventures with the Linux virtual memory subsystem, and my discovery of a creative way to taunt the OOM (out of memory) killer by accumulating memory in the kernel, rather than in userspace. Keep reading and you'll learn: Internal details of the Linux kernel's demand paging implementation How to exploit virtual memory [...] | ||