iterative_nihonium_a6de543d
ls | 12a6d908a68ccf6f9f3d799705577c28763f5deef6eddcff7643d6d8a6de543d
138.22 KB
ELF Executable
Enabled
No eXecute
NX (No eXecute) indicates that the binary has a non-executable stack/heap (i.e., Data Execution Prevention). This prevents code from running in data sections of the process.
PIE
Position Independent Executable
Position Independent Executable (PIE) indicates that the binary is compiled with position-independent code, allowing it to be loaded at any address in memory.
Full
Read-Only Relocations
Read-Only Relocations indicate that the binary has read-only relocations, preventing modification of certain sections at runtime.
Enabled
Stack Canary
Stack Canary indicates that the binary uses stack canaries to detect stack buffer overflows and prevent exploitation.
6 / 12
FORTIFY
Refers to the _FORTIFY_SOURCE feature. “Partial” means some functions (like memcpy, strcpy, etc.) are protected by FORTIFY, but not all possible ones.
Disabled
Clang CFI
These fields being “false” simply mean the binary was not compiled with Clang’s Control Flow Integrity (CFI) or SafeStack support.
Disabled
Clang SafeStack
These fields being “false” simply mean the binary was not compiled with Clang’s Control Flow Integrity (CFI) or SafeStack support.
Disabled
Stack Clash Protection
Stack Clash Protection indicates that the binary has protections against stack clash attacks, which exploit stack memory layout.
| Analysis Signal | Status | Details |
|---|---|---|
| No eXecute | Enabled | NX (No eXecute) indicates that the binary has a non-executable stack/heap (i.e., Data Execution Prevention). This prevents code from running in data sections of the process. |
| Position Independent Executable | PIE | Position Independent Executable (PIE) indicates that the binary is compiled with position-independent code, allowing it to be loaded at any address in memory. |
| Read-Only Relocations | Full | Read-Only Relocations indicate that the binary has read-only relocations, preventing modification of certain sections at runtime. |
| Stack Canary | Enabled | Stack Canary indicates that the binary uses stack canaries to detect stack buffer overflows and prevent exploitation. |
| FORTIFY | 6 / 12 | Refers to the _FORTIFY_SOURCE feature. “Partial” means some functions (like memcpy, strcpy, etc.) are protected by FORTIFY, but not all possible ones. |
| Clang CFI | Disabled | These fields being “false” simply mean the binary was not compiled with Clang’s Control Flow Integrity (CFI) or SafeStack support. |
| Clang SafeStack | Disabled | These fields being “false” simply mean the binary was not compiled with Clang’s Control Flow Integrity (CFI) or SafeStack support. |
| Stack Clash Protection | Disabled | Stack Clash Protection indicates that the binary has protections against stack clash attacks, which exploit stack memory layout. |