首页
社区
课程
招聘
[求助]Ubuntu下加了srm狗壳的elf怎么过
发表于: 2017-4-6 17:10 2499

[求助]Ubuntu下加了srm狗壳的elf怎么过

2017-4-6 17:10
2499

文件信息如下,不带狗走不到入口点(Entry point address:0x956b8da),那么从那里开始下断调试呢?或者能不能脱掉壳运行呢?

FileAtatch :game

# readelf -a ./game

ELF Header:

  Magic:   7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00

  Class:                             ELF32

  Data:                              2's complement, little endian

  Version:                           1 (current)

  OS/ABI:                            UNIX - System V

  ABI Version:                       0

  Type:                              EXEC (Executable file)

  Machine:                           Intel 80386

  Version:                           0x1

  Entry point address:               0x956b8da

  Start of program headers:          52 (bytes into file)

  Start of section headers:          23068095 (bytes into file)

  Flags:                             0x0

  Size of this header:               52 (bytes)

  Size of program headers:           32 (bytes)

  Number of program headers:         7

  Size of section headers:           40 (bytes)

  Number of section headers:         2

  Section header string table index: 1

Section Headers:

  [Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al

  [ 0] protect           PROGBITS        00000000 15ffdab 000000 00      0   0  1

  [ 1] .shstrtab         STRTAB          00000000 15ffdac 000013 00      0   0  1

Key to Flags:

  W (write), A (alloc), X (execute), M (merge), S (strings)

  I (info), L (link order), G (group), T (TLS), E (exclude), x (unknown)

  O (extra OS processing required) o (OS specific), p (processor specific)

There are no section groups in this file.

Program Headers:

  Type           Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align

  PHDR           0x000034 0x08048034 0x08048034 0x00120 0x00120 RWE 0x4

  INTERP         0x000154 0x08048154 0x08048154 0x00013 0x00013 RWE 0x1

      [Requesting program interpreter: /lib/ld-linux.so.2]

  LOAD           0x000000 0x08048000 0x08048000 0xc622ff 0xc622ff RWE 0x1000

  LOAD           0xc62d3c 0x08cabd3c 0x08cabd3c 0x99d06f 0x99d06f RWE 0x1000

  DYNAMIC        0xc62e50 0x08cabe50 0x08cabe50 0x00170 0x00170 RWE 0x4

readelf: Error: no .dynamic section in the dynamic segment

  NOTE           0x000188 0x08048188 0x08048168 0x00024 0x00024 RWE 0x4

  GNU_EH_FRAME   0xb3c210 0x08b84210 0x08b84210 0x28414 0x28414 RWE 0x4

 Section to Segment mapping:

  Segment Sections...

   00

   01

   02

   03

   04

   05

   06

Dynamic section at offset 0xc62e50 contains 44 entries:

  Tag        Type                         Name/Value

 0x00000001 (NEEDED)                     Shared library: [libz.so.1]

 0x00000001 (NEEDED)                     Shared library: [/usr/lib/libcsv.so]

 0x00000001 (NEEDED)                     Shared library: [libopenal.so.1]

 0x00000001 (NEEDED)                     Shared library: [libGL.so.1]

 0x00000001 (NEEDED)                     Shared library: [libGLU.so.1]

 0x00000001 (NEEDED)                     Shared library: [libpthread.so.0]

 0x00000001 (NEEDED)                     Shared library: [libdl.so.2]

 0x00000001 (NEEDED)                     Shared library: [libuuid.so.1]

 0x00000001 (NEEDED)                     Shared library: [libXext.so.6]

 0x00000001 (NEEDED)                     Shared library: [libX11.so.6]

 0x00000001 (NEEDED)                     Shared library: [libasound.so.2]

 0x00000001 (NEEDED)                     Shared library: [libcaca.so.0]

 0x00000001 (NEEDED)                     Shared library: [libpulse.so.0]

 0x00000001 (NEEDED)                     Shared library: [libpulse-simple.so.0]

 0x00000001 (NEEDED)                     Shared library: [libssl.so.1.0.0]

 0x00000001 (NEEDED)                     Shared library: [libcrypto.so.1.0.0]

 0x00000001 (NEEDED)                     Shared library: [libstdc++.so.6]

 0x00000001 (NEEDED)                     Shared library: [libm.so.6]

 0x00000001 (NEEDED)                     Shared library: [libgcc_s.so.1]

 0x00000001 (NEEDED)                     Shared library: [libc.so.6]

 0x0000000f (RPATH)                      Library rpath: [/usr/lib/PhysX/v2.8.1/]

 0x0000000c (INIT)                       0x8053870

 0x0000000d (FINI)                       0x8abf8c4

 0x00000019 (INIT_ARRAY)                 0x8cabd3c

 0x0000001b (INIT_ARRAYSZ)               136 (bytes)

 0x0000001a (FINI_ARRAY)                 0x8cabdc4

 0x0000001c (FINI_ARRAYSZ)               4 (bytes)

 0x00000005 (STRTAB)                     0x804ce44

 0x00000006 (SYMTAB)                     0x8048944

 0x0000000a (STRSZ)                      6026 (bytes)

 0x0000000b (SYMENT)                     16 (bytes)

 0x00000015 (DEBUG)                      0x0

 0x00000003 (PLTGOT)                     0x8cac000

 0x00000002 (PLTRELSZ)                   848 (bytes)

 0x00000014 (PLTREL)                     REL

 0x00000017 (JMPREL)                     0x8051c90

 0x00000011 (REL)                        0x8051c20

 0x00000012 (RELSZ)                      88 (bytes)

 0x00000013 (RELENT)                     8 (bytes)

 0x6ffffffe (VERNEED)                    0x8051910

 0x6fffffff (VERNEEDNUM)                 12

 0x6ffffff0 (VERSYM)                     0x8051070

 0x00000004 (HASH)                       0x9559d2c

 0x6ffffffc (VERDEF)                     0x956530c

There are no relocations in this file.

The decoding of unwind sections for machine type Intel 80386 is not currently supported.

Histogram for bucket list length (total of 211 buckets):

 Length  Number     % of total  Coverage

      0  47         ( 22.3%)

      1  59         ( 28.0%)     18.2%

      2  63         ( 29.9%)     56.9%

      3  30         ( 14.2%)     84.6%

      4  10         (  4.7%)     96.9%

      5  2          (  0.9%)    100.0%

No version information found in this file.



[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回