Closed przemyslaw0 closed 4 months ago
intruducer
attempts to locate libc.so
because of dlopen
.
If the target binary is linked statically (or it doesn't depend on libc), we cannot retrieve the base address of libc.so
- just take a look at cat /proc/${PID}/maps
.
I cannot think of an effective workaround unfortunately, but here are few ideas:
dlopen
and let intruducer
dynamically link and load the target library ( :exploding_head: :gun: );intruducer
and the target share the same instruction set (= the processes are of the same class, 32 or 64 bit), make intruducer
load libc.so
and make it copy itself into the target memory. Now we have dlopen
within the target process ( :exploding_head: :gun: );libc.so
, we could scan the memory and look for dlopen
s signature(s) pattern (hoping it has not been stripped) ( :exploding_head: :gun: ).PS: intruducer
was a project for my bachelor's thesis, please consider it as a baby :sob:
Ok, I got.
When the process is started by a static executable, libraries cannot be injected by
intruducer
.Is it a sane behavior? Any way to fix this?