- Learning Linux Binary Analysis
- Ryan “elfmaster” O'Neill
- 421字
- 2021-07-16 12:56:54
Coding an ELF Parser
To help summarize some of what we have learned, I have included some simple code that will print the program headers and section names of a 32-bit ELF executable. Many more examples of ELF-related code (and much more interesting ones) will be shown throughout this book:
/* elfparse.c – gcc elfparse.c -o elfparse */ #include <stdio.h> #include <string.h> #include <errno.h> #include <elf.h> #include <unistd.h> #include <stdlib.h> #include <sys/mman.h> #include <stdint.h> #include <sys/stat.h> #include <fcntl.h> int main(int argc, char **argv) { int fd, i; uint8_t *mem; struct stat st; char *StringTable, *interp; Elf32_Ehdr *ehdr; Elf32_Phdr *phdr; Elf32_Shdr *shdr; if (argc < 2) { printf("Usage: %s <executable>\n", argv[0]); exit(0); } if ((fd = open(argv[1], O_RDONLY)) < 0) { perror("open"); exit(-1); } if (fstat(fd, &st) < 0) { perror("fstat"); exit(-1); } /* Map the executable into memory */ mem = mmap(NULL, st.st_size, PROT_READ, MAP_PRIVATE, fd, 0); if (mem == MAP_FAILED) { perror("mmap"); exit(-1); } /* * The initial ELF Header starts at offset 0 * of our mapped memory. */ ehdr = (Elf32_Ehdr *)mem; /* * The shdr table and phdr table offsets are * given by e_shoff and e_phoff members of the * Elf32_Ehdr. */ phdr = (Elf32_Phdr *)&mem[ehdr->e_phoff]; shdr = (Elf32_Shdr *)&mem[ehdr->e_shoff]; /* * Check to see if the ELF magic (The first 4 bytes) * match up as 0x7f E L F */ if (mem[0] != 0x7f && strcmp(&mem[1], "ELF")) { fprintf(stderr, "%s is not an ELF file\n", argv[1]); exit(-1); } /* We are only parsing executables with this code. * so ET_EXEC marks an executable. */ if (ehdr->e_type != ET_EXEC) { fprintf(stderr, "%s is not an executable\n", argv[1]); exit(-1); } printf("Program Entry point: 0x%x\n", ehdr->e_entry); /* * We find the string table for the section header * names with e_shstrndx which gives the index of * which section holds the string table. */ StringTable = &mem[shdr[ehdr->e_shstrndx].sh_offset]; /* * Print each section header name and address. * Notice we get the index into the string table * that contains each section header name with * the shdr.sh_name member. */ printf("Section header list:\n\n"); for (i = 1; i < ehdr->e_shnum; i++) printf("%s: 0x%x\n", &StringTable[shdr[i].sh_name], shdr[i].sh_addr); /* * Print out each segment name, and address. * Except for PT_INTERP we print the path to * the dynamic linker (Interpreter). */ printf("\nProgram header list\n\n"); for (i = 0; i < ehdr->e_phnum; i++) { switch(phdr[i].p_type) { case PT_LOAD: /* * We know that text segment starts * at offset 0. And only one other * possible loadable segment exists * which is the data segment. */ if (phdr[i].p_offset == 0) printf("Text segment: 0x%x\n", phdr[i].p_vaddr); else printf("Data segment: 0x%x\n", phdr[i].p_vaddr); break; case PT_INTERP: interp = strdup((char *)&mem[phdr[i].p_offset]); printf("Interpreter: %s\n", interp); break; case PT_NOTE: printf("Note segment: 0x%x\n", phdr[i].p_vaddr); break; case PT_DYNAMIC: printf("Dynamic segment: 0x%x\n", phdr[i].p_vaddr); break; case PT_PHDR: printf("Phdr segment: 0x%x\n", phdr[i].p_vaddr); break; } } exit(0); }
Tip
Downloading the example code
You can download the example code files from your account at http://www.packtpub.com for all the Packt Publishing books you have purchased. If you purchased this book elsewhere, you can visit http://www.packtpub.com/support and register to have the files e-mailed directly to you.
推薦閱讀
- Mastering ServiceStack
- Arduino by Example
- ASP.NET Core Essentials
- JIRA 7 Administration Cookbook(Second Edition)
- 數據結構(Python語言描述)(第2版)
- Java EE 7 Development with NetBeans 8
- PostgreSQL Replication(Second Edition)
- TradeStation交易應用實踐:量化方法構建贏家策略(原書第2版)
- 信息技術應用基礎
- Selenium Testing Tools Cookbook(Second Edition)
- Visual C++開發入行真功夫
- WordPress 4.0 Site Blueprints(Second Edition)
- 劍指大數據:企業級數據倉庫項目實戰(在線教育版)
- Learning Material Design
- Advanced Python Programming