https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/ All ELF binaries have an Entry Point which is where the code begins and CPU starts executing those instructions for editing those you have 2choices 1. change Entry Point's value to a code cave on the binary and write whatever code you want there and then jump back 2. change the instructions directly (you have to be very careful) *if you open the file with a hex editor and get the hex values in the address pointed by Entry Point you'll find that they are asm instructions I had written a small program for injecting shellcode to ELF binaries you can have a look at that too https://github.com/NullByteGTK/ELF-Infector I dont know about PE executables but I think you can do these with them too
Обсуждают сегодня