Closed blackb0x101 closed 4 years ago
I guess this is part of the trick in that binary ? anyway. u can hook the final mprotect and reimplement the mprotect.
should be easy to fix this issue.
I mean it might not be a "bug" , might be some trick from the binary. considering this is a ctf binary.
Hello @xwings and thanks for your answer.
Maybe it is, but the binary runs without problem outside of Qiling. A quick static analysis revealed that the main CTF code is not within the normal glibc main. Anyway, I'll try to hook mprotect and see where it leads me. Thanks for your help
Hello,
First thank you for this amazing project 😃 👍. I'm having an issue emulating a binary. Find below the details
Describe the bug Trying to emulate an x86_64 binary yields a
UC_ERR_WRITE_PROT
error:Sample Code
Expected behavior The binary is run successfully
Additional context
File type
If it's any help, the file is the challenge "headache" from the hackthebox platform: https://www.hackthebox.eu/home/challenges/Reversing. I can provide the binary if needed
Environment
I tried on two platforms:
I attached the output log to the ticket. Please feel free to come back to me for more information.
headache.txt
Many thanks for your help