Example 3: Binary Format Modification
This example showcases the power of OFRAK in analyzing, and contextually modifying complex binary
formats, in this case an ELF executable!
The input program is a compiled binary ELF file which prints "Hello, World!" to the console.
#include <stdio.h>
int main() {
printf("Hello, World!\n");
return 0;
}
The example analyzes the ELF headers and changes the permissions for the LOAD program header,
marking the section as non-executable.
wat do u mean program no run?? 😿
Example OFRAK script:
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76 | import argparse
import os
from ofrak import OFRAK, OFRAKContext
from ofrak.core import (
Elf,
ElfProgramHeader,
ElfProgramHeaderType,
ElfProgramHeaderModifier,
ElfProgramHeaderModifierConfig,
)
from ofrak_type.memory_permissions import MemoryPermissions
ASSETS_DIR = os.path.abspath(os.path.join(os.path.dirname(__file__), "assets"))
BINARY_FILE = os.path.join(ASSETS_DIR, "example_program")
async def main(ofrak_context: OFRAKContext, file_path: str, output_file_name: str):
root_resource = await ofrak_context.create_root_resource_from_file(file_path)
await root_resource.unpack()
elf_v = await root_resource.view_as(Elf)
exec_load_program_header = await get_exec_load_program_header(elf_v)
# Make this program header non-executable
await exec_load_program_header.resource.run(
ElfProgramHeaderModifier,
ElfProgramHeaderModifierConfig(
p_flags=exec_load_program_header.p_flags & ~MemoryPermissions.X.value
),
)
# Dump the modified program to disk
await root_resource.pack()
await root_resource.flush_data_to_disk(output_file_name)
print(f"Done! Output file written to {output_file_name}")
async def get_exec_load_program_header(elf_v: Elf) -> ElfProgramHeader:
"""Return the first executable LOAD program header in `elf_view`."""
for program_header in await elf_v.get_program_headers():
if (
program_header.p_type == ElfProgramHeaderType.LOAD.value
and program_header.p_flags & MemoryPermissions.X.value
):
return program_header
raise RuntimeError(f"Could not find executable LOAD program header in {elf_v}")
if __name__ == "__main__":
parser = argparse.ArgumentParser()
parser.add_argument("--hello-world-file", default=BINARY_FILE)
parser.add_argument("--output-file-name", default="./example_3_segmeow")
args = parser.parse_args()
ofrak = OFRAK()
ofrak.run(main, args.hello_world_file, args.output_file_name)
|