ls
12a6d908a68ccf6f9f3d799705577c28763f5deef6eddcff7643d6d8a6de543d
Analysis Signal | Status | Details |
---|---|---|
No eXecute | Enabled | NX (No eXecute) indicates that the binary has a non-executable stack/heap (i.e., Data Execution Prevention). This prevents code from running in data sections of the process. |
Position Independent Executable | PIE | Position Independent Executable (PIE) indicates that the binary is compiled with position-independent code, allowing it to be loaded at any address in memory. |
Read-Only Relocations | Full | Read-Only Relocations indicate that the binary has read-only relocations, preventing modification of certain sections at runtime. |
Stack Canary | Enabled | Stack Canary indicates that the binary uses stack canaries to detect stack buffer overflows and prevent exploitation. |
FORTIFY | 6 / 12 | Refers to the _FORTIFY_SOURCE feature. “Partial” means some functions (like memcpy, strcpy, etc.) are protected by FORTIFY, but not all possible ones. |
Clang CFI | Disabled | These fields being “false” simply mean the binary was not compiled with Clang’s Control Flow Integrity (CFI) or SafeStack support. |
Clang SafeStack | Disabled | These fields being “false” simply mean the binary was not compiled with Clang’s Control Flow Integrity (CFI) or SafeStack support. |
Stack Clash Protection | Disabled | Stack Clash Protection indicates that the binary has protections against stack clash attacks, which exploit stack memory layout. |