Skip to content
master
Go to file
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 

README.md

Linux Anti-debugging Demo

This is a very simple demo of an anti-debugging idea that randomly popped into my mind.

Classic anti-debugging techniques on Linux are usually either checking TracerPID in /proc/pid/status or using ptrace to attach to the process and do nothing. These techniques are very easy to bypass, and in many cases can't even waste the reverse any time.

So instead of attaching to the process but doing nothing, what about we actually do something?

In this demo, the program has a custom system call (it's just write with a different system call number and argument order in this case) that cannot be recognized by any standard system. It must rely on its own ptrace code to dynamically replace those calls with standard write calls. So whenever someone detaches it and attaches his own debugger, the program automatically loses its ability to run normally.

This demo itself is still quite easy to bypass, since reversers can easily analyze the syscall mapping and implement it into their own debuggers. To make it more effective against (non-retarded) reversers, consider doing the following:

  • Build a customized libc with all syscall numbers modified
  • Or even dynamically randomize the syscall mapping each time the program starts
  • Further mess up the argument (register) order
  • Do some weird things to register values (XOR, rotations etc.)
  • Compile your ptrace code with OLLVM or use other obfuscators

About

No description or website provided.

Topics

Resources

Releases

No releases published

Packages

No packages published
You can’t perform that action at this time.