Binaries
Key Binary Behaviors in Dynamic Analysis
UID Checks and Privilege Escalation
The
setuid(0)function call attempts to set theUIDtoroot. If it succeeds returns0.A failure (
-1) may indicate the program requires elevated permissions to execute certain operations.
Whitelists/Blacklists
strncmporstrcmpcalls are used to compare input against predefined strings. A return value of-1indicates a mismatch.strcspncalls are used to check for forbidden characters (e.g.,|,&,>, which could be part of command injection attempts).
File Operations and File Descriptors
Look for files related to user credentials, configuration, or logs.
External Command Execution
Calls to
system(),execvp(), or similar functions: These often indicate the program is executing shell commands.Input passed to these commands: If user input directly influences these calls, it might indicate an injection vulnerability.
Signals and Inter-Process Communication
Signals like
SIGCHLD,SIGSEGV, orSIGKILLin the output.Use of
kill()to manage or terminate processes, which can indicate how the program interacts with other processes.
Last updated