Shared library injection into a Linux process (bonus)

Introduction This bonus article describes a second easy method to retrieve a symbol address into a process. The first method was exposed here. As explained previously, the injected lib is loaded into the victim process (yeah, that’s the goal) but also into the injector in order to compute an offset. This last loading can cause several drawbacks: Load a library just to compute an offset may be overkill. If the library contains some constructors, these ones will be run into … Lire la suite de Shared library injection into a Linux process (bonus)