Open aarontp opened 6 years ago
same problem
I fix it by letting the user of program needed to be injected run pyrasite-shell By:
sudo vi /etc/sysctl.d/10-ptrace.conf ; set the value from 1 to 0; sudo sysctl -p; sudo vi /proc/sys/kernel/yama/ptrace_scope; set the value from 1 to 0; sudo +s /usr/bin/gdb
I fix it by letting everyone to read the temp file used to store the injected commands: (in file ipc.py
)
def create_payload(self):
"""Write out a reverse python connection payload with a custom port"""
(fd, filename) = tempfile.mkstemp()
+ os.chmod(filename, 0o644)
tmp = os.fdopen(fd, 'w')
path = dirname(abspath(pyrasite.__file__))
payload = open(join(path, 'reverse.py'))
Hello:
I'm seeing the following in the ouput of the debugged process when trying to run pyrasite-shell on it:
And that file does not exist. My usage is just:
Normal pyrasite seems to work, at least this does:
Any thoughts?