├── .gitignore ├── LICENSE ├── Makefile ├── README.md ├── RELRO ├── Makefile ├── README.md ├── checkrelro.sh ├── full ├── partial └── testcase.c ├── StackProtector ├── Makefile ├── README.md ├── all │ ├── Makefile │ ├── ssp.c │ └── sspstrong.c ├── regular │ ├── Makefile │ ├── ssp.c │ └── sspstrong.c └── strong │ ├── Makefile │ ├── ssp.c │ └── sspstrong.c ├── fortify_source ├── 0 │ ├── Makefile │ ├── fortify1vs2.c │ ├── fortify_source.c │ ├── fortify_source1.c │ ├── fortify_source2.c │ └── fortify_source3.c ├── 1 │ ├── Makefile │ ├── fortify1vs2.c │ ├── fortify_source.c │ ├── fortify_source1.c │ ├── fortify_source2.c │ └── fortify_source3.c ├── 2 │ ├── Makefile │ ├── fortify1vs2.c │ ├── fortify_source.c │ ├── fortify_source1.c │ ├── fortify_source2.c │ └── fortify_source3.c ├── Makefile └── README.md └── make.rule /.gitignore: -------------------------------------------------------------------------------- 1 | # Object files 2 | *.o 3 | *.ko 4 | *.obj 5 | *.elf 6 | 7 | # Precompiled Headers 8 | *.gch 9 | *.pch 10 | 11 | # Libraries 12 | *.lib 13 | *.a 14 | *.la 15 | *.lo 16 | 17 | # Shared objects (inc. Windows DLLs) 18 | *.dll 19 | *.so 20 | *.so.* 21 | *.dylib 22 | 23 | # Executables 24 | *.exe 25 | *.out 26 | *.app 27 | *.i*86 28 | *.x86_64 29 | *.hex 30 | 31 | # Debug files 32 | *.dSYM/ 33 | *.su 34 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | Apache License 2 | Version 2.0, January 2004 3 | http://www.apache.org/licenses/ 4 | 5 | TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 6 | 7 | 1. Definitions. 8 | 9 | "License" shall mean the terms and conditions for use, reproduction, 10 | and distribution as defined by Sections 1 through 9 of this document. 11 | 12 | "Licensor" shall mean the copyright owner or entity authorized by 13 | the copyright owner that is granting the License. 14 | 15 | "Legal Entity" shall mean the union of the acting entity and all 16 | other entities that control, are controlled by, or are under common 17 | control with that entity. For the purposes of this definition, 18 | "control" means (i) the power, direct or indirect, to cause the 19 | direction or management of such entity, whether by contract or 20 | otherwise, or (ii) ownership of fifty percent (50%) or more of the 21 | outstanding shares, or (iii) beneficial ownership of such entity. 22 | 23 | "You" (or "Your") shall mean an individual or Legal Entity 24 | exercising permissions granted by this License. 25 | 26 | "Source" form shall mean the preferred form for making modifications, 27 | including but not limited to software source code, documentation 28 | source, and configuration files. 29 | 30 | "Object" form shall mean any form resulting from mechanical 31 | transformation or translation of a Source form, including but 32 | not limited to compiled object code, generated documentation, 33 | and conversions to other media types. 34 | 35 | "Work" shall mean the work of authorship, whether in Source or 36 | Object form, made available under the License, as indicated by a 37 | copyright notice that is included in or attached to the work 38 | (an example is provided in the Appendix below). 39 | 40 | "Derivative Works" shall mean any work, whether in Source or Object 41 | form, that is based on (or derived from) the Work and for which the 42 | editorial revisions, annotations, elaborations, or other modifications 43 | represent, as a whole, an original work of authorship. For the purposes 44 | of this License, Derivative Works shall not include works that remain 45 | separable from, or merely link (or bind by name) to the interfaces of, 46 | the Work and Derivative Works thereof. 47 | 48 | "Contribution" shall mean any work of authorship, including 49 | the original version of the Work and any modifications or additions 50 | to that Work or Derivative Works thereof, that is intentionally 51 | submitted to Licensor for inclusion in the Work by the copyright owner 52 | or by an individual or Legal Entity authorized to submit on behalf of 53 | the copyright owner. For the purposes of this definition, "submitted" 54 | means any form of electronic, verbal, or written communication sent 55 | to the Licensor or its representatives, including but not limited to 56 | communication on electronic mailing lists, source code control systems, 57 | and issue tracking systems that are managed by, or on behalf of, the 58 | Licensor for the purpose of discussing and improving the Work, but 59 | excluding communication that is conspicuously marked or otherwise 60 | designated in writing by the copyright owner as "Not a Contribution." 61 | 62 | "Contributor" shall mean Licensor and any individual or Legal Entity 63 | on behalf of whom a Contribution has been received by Licensor and 64 | subsequently incorporated within the Work. 65 | 66 | 2. Grant of Copyright License. Subject to the terms and conditions of 67 | this License, each Contributor hereby grants to You a perpetual, 68 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable 69 | copyright license to reproduce, prepare Derivative Works of, 70 | publicly display, publicly perform, sublicense, and distribute the 71 | Work and such Derivative Works in Source or Object form. 72 | 73 | 3. Grant of Patent License. Subject to the terms and conditions of 74 | this License, each Contributor hereby grants to You a perpetual, 75 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable 76 | (except as stated in this section) patent license to make, have made, 77 | use, offer to sell, sell, import, and otherwise transfer the Work, 78 | where such license applies only to those patent claims licensable 79 | by such Contributor that are necessarily infringed by their 80 | Contribution(s) alone or by combination of their Contribution(s) 81 | with the Work to which such Contribution(s) was submitted. If You 82 | institute patent litigation against any entity (including a 83 | cross-claim or counterclaim in a lawsuit) alleging that the Work 84 | or a Contribution incorporated within the Work constitutes direct 85 | or contributory patent infringement, then any patent licenses 86 | granted to You under this License for that Work shall terminate 87 | as of the date such litigation is filed. 88 | 89 | 4. Redistribution. You may reproduce and distribute copies of the 90 | Work or Derivative Works thereof in any medium, with or without 91 | modifications, and in Source or Object form, provided that You 92 | meet the following conditions: 93 | 94 | (a) You must give any other recipients of the Work or 95 | Derivative Works a copy of this License; and 96 | 97 | (b) You must cause any modified files to carry prominent notices 98 | stating that You changed the files; and 99 | 100 | (c) You must retain, in the Source form of any Derivative Works 101 | that You distribute, all copyright, patent, trademark, and 102 | attribution notices from the Source form of the Work, 103 | excluding those notices that do not pertain to any part of 104 | the Derivative Works; and 105 | 106 | (d) If the Work includes a "NOTICE" text file as part of its 107 | distribution, then any Derivative Works that You distribute must 108 | include a readable copy of the attribution notices contained 109 | within such NOTICE file, excluding those notices that do not 110 | pertain to any part of the Derivative Works, in at least one 111 | of the following places: within a NOTICE text file distributed 112 | as part of the Derivative Works; within the Source form or 113 | documentation, if provided along with the Derivative Works; or, 114 | within a display generated by the Derivative Works, if and 115 | wherever such third-party notices normally appear. The contents 116 | of the NOTICE file are for informational purposes only and 117 | do not modify the License. You may add Your own attribution 118 | notices within Derivative Works that You distribute, alongside 119 | or as an addendum to the NOTICE text from the Work, provided 120 | that such additional attribution notices cannot be construed 121 | as modifying the License. 122 | 123 | You may add Your own copyright statement to Your modifications and 124 | may provide additional or different license terms and conditions 125 | for use, reproduction, or distribution of Your modifications, or 126 | for any such Derivative Works as a whole, provided Your use, 127 | reproduction, and distribution of the Work otherwise complies with 128 | the conditions stated in this License. 129 | 130 | 5. Submission of Contributions. Unless You explicitly state otherwise, 131 | any Contribution intentionally submitted for inclusion in the Work 132 | by You to the Licensor shall be under the terms and conditions of 133 | this License, without any additional terms or conditions. 134 | Notwithstanding the above, nothing herein shall supersede or modify 135 | the terms of any separate license agreement you may have executed 136 | with Licensor regarding such Contributions. 137 | 138 | 6. Trademarks. This License does not grant permission to use the trade 139 | names, trademarks, service marks, or product names of the Licensor, 140 | except as required for reasonable and customary use in describing the 141 | origin of the Work and reproducing the content of the NOTICE file. 142 | 143 | 7. Disclaimer of Warranty. Unless required by applicable law or 144 | agreed to in writing, Licensor provides the Work (and each 145 | Contributor provides its Contributions) on an "AS IS" BASIS, 146 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or 147 | implied, including, without limitation, any warranties or conditions 148 | of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A 149 | PARTICULAR PURPOSE. You are solely responsible for determining the 150 | appropriateness of using or redistributing the Work and assume any 151 | risks associated with Your exercise of permissions under this License. 152 | 153 | 8. Limitation of Liability. In no event and under no legal theory, 154 | whether in tort (including negligence), contract, or otherwise, 155 | unless required by applicable law (such as deliberate and grossly 156 | negligent acts) or agreed to in writing, shall any Contributor be 157 | liable to You for damages, including any direct, indirect, special, 158 | incidental, or consequential damages of any character arising as a 159 | result of this License or out of the use or inability to use the 160 | Work (including but not limited to damages for loss of goodwill, 161 | work stoppage, computer failure or malfunction, or any and all 162 | other commercial damages or losses), even if such Contributor 163 | has been advised of the possibility of such damages. 164 | 165 | 9. Accepting Warranty or Additional Liability. While redistributing 166 | the Work or Derivative Works thereof, You may choose to offer, 167 | and charge a fee for, acceptance of support, warranty, indemnity, 168 | or other liability obligations and/or rights consistent with this 169 | License. However, in accepting such obligations, You may act only 170 | on Your own behalf and on Your sole responsibility, not on behalf 171 | of any other Contributor, and only if You agree to indemnify, 172 | defend, and hold each Contributor harmless for any liability 173 | incurred by, or claims asserted against, such Contributor by reason 174 | of your accepting any such warranty or additional liability. 175 | 176 | END OF TERMS AND CONDITIONS 177 | 178 | APPENDIX: How to apply the Apache License to your work. 179 | 180 | To apply the Apache License to your work, attach the following 181 | boilerplate notice, with the fields enclosed by brackets "{}" 182 | replaced with your own identifying information. (Don't include 183 | the brackets!) The text should be enclosed in the appropriate 184 | comment syntax for the file format. We also recommend that a 185 | file or class name and description of purpose be included on the 186 | same "printed page" as the copyright notice for easier 187 | identification within third-party archives. 188 | 189 | Copyright {yyyy} {name of copyright owner} 190 | 191 | Licensed under the Apache License, Version 2.0 (the "License"); 192 | you may not use this file except in compliance with the License. 193 | You may obtain a copy of the License at 194 | 195 | http://www.apache.org/licenses/LICENSE-2.0 196 | 197 | Unless required by applicable law or agreed to in writing, software 198 | distributed under the License is distributed on an "AS IS" BASIS, 199 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 200 | See the License for the specific language governing permissions and 201 | limitations under the License. 202 | -------------------------------------------------------------------------------- /Makefile: -------------------------------------------------------------------------------- 1 | DIRS = RELRO fortify_source StackProtector 2 | # ldd3-examples : failed to compile 3 | 4 | all: 5 | $(foreach dir,$(DIRS),$(MAKE) -C $(dir);) 6 | 7 | clean: 8 | $(foreach dir,$(DIRS),$(MAKE) clean -C $(dir);) 9 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # TraditionalMitigation 2 | 3 | List all the traditional mitigations in compilers(GCC, Clang, etc.) to defend memory corruption 4 | 5 | ## User space 6 | 7 | - Stack Protector 8 | - `-fstack-protector`, `-fstack-protector-all`, `-fstack-protector-strong` 9 | 10 | - Heap protection 11 | - enable by default 12 | 13 | - Double free checking 14 | - enable by default 15 | 16 | - Libc pointer encryption 17 | - enable by default 18 | 19 | - FORTIFY_SOURCE 20 | - `-D_FORTIFY_SOURCE=2­-O2` 21 | 22 | - Format String Protection 23 | - `-Wformat ­-Wformat-security` 24 | 25 | - PIC/PIE 26 | - `-fPIC`, `-fPIE -pie` 27 | 28 | - RELRO 29 | - `-Wl,-z,relro,-z,now` 30 | 31 | - Stack clash protection 32 | - `-fstack-clash-protection` 33 | 34 | ------------------------------------------------- 35 | 36 | ## Kernel space 37 | 38 | - Stack Protector 39 | - implemented in Linux Kernel 40 | 41 | - Slab/Slub/Slob Protection 42 | - implemented in Linux kernel 43 | 44 | - FORTIFY_SOURCE 45 | - implemented in Linux Kernel 46 | 47 | - NX 48 | - implemented in Linux Kernel 49 | 50 | - SMAP/SMEP 51 | - implemented in Linux kernel 52 | 53 | - ASLR(Address Space Layout Randomization) 54 | - implemented in Linux Kernel 55 | 56 | - KASLR(Kernel Address Space Layout Randomization) 57 | - implemented in Linux Kernel 58 | 59 | # References 60 | 61 | [1] [Secure Programming with GCC and GLibc](https://cansecwest.com/csw08/csw08-holtmann.pdf) 62 | -------------------------------------------------------------------------------- /RELRO/Makefile: -------------------------------------------------------------------------------- 1 | TARGET = partial full 2 | 3 | all : $(TARGET) 4 | 5 | partial: testcase.c 6 | gcc -g -o $@ $< 7 | 8 | full: testcase.c 9 | gcc -g -Wl,-z,relro,-z,now -o $@ $< 10 | 11 | clean: 12 | rm -f $(TARGET) 13 | -------------------------------------------------------------------------------- /RELRO/README.md: -------------------------------------------------------------------------------- 1 | From [RELRO - A (not so well known) Memory Corruption Mitigation Technique](http://tk-blog.blogspot.com/2009/02/relro-not-so-well-known-memory.html) 2 | 3 | ## Testcase 1 (Ubuntu 14.04.4 LTS): Partial RELRO 4 | 5 | #### File: testcase.c 6 | 7 | This test program tries to write the value 0x41414141 at a given memory address. 8 | 9 | Compiling "testcase" with partial RELRO: 10 | 11 | $ gcc -g -o partial testcase.c 12 | 13 | Test binary: 14 | 15 | $ ./checkrelro.sh --file partial 16 | partial - partial RELRO 17 | 18 | Get GOT entry of printf(3): 19 | 20 | $ readelf -r ./partial | grep printf 21 | 0804a00c 00000407 R_386_JUMP_SLOT 00000000 printf 22 | 23 | Try to modify the GOT address: 24 | 25 | ```sh 26 | $ gdb -q ./partial 27 | (gdb) r 0x0804a00c 28 | Starting program: /home/mudongliang/Work/partial 0x0804a00c 29 | 30 | Program received signal SIGSEGV, Segmentation fault. 31 | 0x41414141 in ?? () 32 | ``` 33 | 34 | If only partial RELRO is used, it is still possible to modify arbitrary GOT entries to gain control of the execution flow of a process. 35 | 36 | ## Testcase 2 (Ubuntu 14.04.4 LTS): Full RELRO 37 | 38 | Compiling "testcase" with full RELRO: 39 | 40 | $ gcc -g -Wl,-z,relro,-z,now -o full testcase.c 41 | 42 | Test binary: 43 | 44 | $ ./checkrelro.sh --file full 45 | full - full RELRO 46 | 47 | Get GOT entry of printf(3): 48 | 49 | $ readelf -r ./full | grep printf 50 | 08049fec 00000107 R_386_JUMP_SLOT 00000000 printf 51 | 52 | Try to modify the GOT address: 53 | 54 | ```sh 55 | $ gdb -q ./full 56 | (gdb) r 0x08049fec 57 | Starting program: /home/mudongliang/Work/full 0x08049fec 58 | 59 | Program received signal SIGSEGV, Segmentation fault. 60 | 0x0804847e in main (argc=2, argv=0xbffff734) at testcase.c:5 61 | 8 p[0] = 0x41414141; 62 | 63 | ``` 64 | 65 | If full RELRO is enabled, the attempt to overwrite a GOT address leads to an error as the GOT section is mapped read-only. 66 | -------------------------------------------------------------------------------- /RELRO/checkrelro.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Tobias Klein, 02/2009 3 | # http://www.trapkit.de 4 | 5 | # help 6 | if [ "$#" = "0" ]; then 7 | echo "usage: checkrelro OPTIONS" 8 | echo -e "\t--file " 9 | echo -e "\t--dir " 10 | echo -e "\t--proc " 11 | echo -e "\t--proc-all" 12 | echo 13 | exit 1 14 | fi 15 | 16 | # check if a file supports RELRO 17 | bincheckrelro() { 18 | if readelf -l $1 2>/dev/null | grep -q 'GNU_RELRO'; then 19 | if readelf -d $1 2>/dev/null | grep -q 'BIND_NOW'; then 20 | echo -n -e '\033[32mfull RELRO\033[m' 21 | else 22 | echo -n -e '\033[33mpartial RELRO\033[m' 23 | fi 24 | else 25 | echo -n -e '\033[31mno RELRO\033[m' 26 | fi 27 | } 28 | 29 | # check if a process supports RELRO 30 | proccheckrelro() { 31 | if readelf -l $1/exe 2>/dev/null | grep -q 'Program Headers'; then 32 | if readelf -l $1/exe 2>/dev/null | grep -q 'GNU_RELRO'; then 33 | if readelf -d $1/exe 2>/dev/null | grep -q 'BIND_NOW'; then 34 | echo -n -e '\033[32mfull RELRO\033[m' 35 | else 36 | echo -n -e '\033[33mpartial RELRO\033[m' 37 | fi 38 | else 39 | echo -n -e '\033[31mno RELRO\033[m' 40 | fi 41 | else 42 | echo -n -e '\033[31mPermission denied\033[m' 43 | fi 44 | } 45 | 46 | if [ "$1" = "--dir" ]; then 47 | cd /$2 48 | for I in [a-z]*; do 49 | if [ "$I" != "[a-z]*" ]; then 50 | echo -n -e $I 51 | echo -n -e ' - ' 52 | bincheckrelro $I 53 | echo 54 | fi 55 | done 56 | exit 0 57 | fi 58 | 59 | if [ "$1" = "--file" ]; then 60 | echo -n -e $2 61 | echo -n -e ' - ' 62 | bincheckrelro $2 63 | echo 64 | exit 0 65 | fi 66 | 67 | if [ "$1" = "--proc-all" ]; then 68 | cd /proc 69 | for I in [1-9]*; do 70 | if [ $I != $$ ] && readlink -q $I/exe > /dev/null; then 71 | echo -n -e `head -1 $I/status | cut -b 7-` 72 | echo -n -e ' (' 73 | echo -n -e $I 74 | echo -n -e ') - ' 75 | proccheckrelro $I 76 | echo 77 | fi 78 | done 79 | exit 0 80 | fi 81 | 82 | if [ "$1" = "--proc" ]; then 83 | cd /proc 84 | for I in `pidof $2`; do 85 | if [ -d $I ]; then 86 | echo -n -e $2 87 | echo -n -e ' (' 88 | echo -n -e $I 89 | echo -n -e ') - ' 90 | proccheckrelro $I 91 | echo 92 | fi 93 | done 94 | fi 95 | -------------------------------------------------------------------------------- /RELRO/full: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/hardenedlinux/TraditionalMitigation/82ba8faef35e655a19aa5663ac79c8bb804aa87b/RELRO/full -------------------------------------------------------------------------------- /RELRO/partial: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/hardenedlinux/TraditionalMitigation/82ba8faef35e655a19aa5663ac79c8bb804aa87b/RELRO/partial -------------------------------------------------------------------------------- /RELRO/testcase.c: -------------------------------------------------------------------------------- 1 | #include 2 | 3 | int main(int argc, char *argv[]){ 4 | size_t *p = (size_t) strtol(argv[1], NULL, 16); 5 | p[0] = 0x41414141; 6 | printf("RELRO : %p\n", p); 7 | 8 | return 0; 9 | } 10 | -------------------------------------------------------------------------------- /StackProtector/Makefile: -------------------------------------------------------------------------------- 1 | DIRS = all regular strong 2 | 3 | all: 4 | $(foreach dir,$(DIRS),$(MAKE) -C $(dir);) 5 | 6 | clean: 7 | $(foreach dir,$(DIRS),$(MAKE) clean -C $(dir);) 8 | -------------------------------------------------------------------------------- /StackProtector/README.md: -------------------------------------------------------------------------------- 1 | [GCC Stack Protector Examples](http://mudongliang.github.io/2016/05/24/debian-gcc-stack-protector-examples.html) 2 | 3 | [GCC Stack Protector options](http://mudongliang.github.io/2016/05/24/stack-protector.html) 4 | 5 | -------------------------------------------------------------------------------- /StackProtector/all/Makefile: -------------------------------------------------------------------------------- 1 | include ../../make.rule 2 | 3 | SECFLAGS = $(STACKALL) 4 | TARGET = ssp sspstrong 5 | 6 | all: $(TARGET) 7 | -------------------------------------------------------------------------------- /StackProtector/all/ssp.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: ssp.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Tue 24 May 2016 08:45:54 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[5]; 14 | strcpy(buffer, "ABCDE"); 15 | printf("%s\n",buffer); 16 | return 0; 17 | } 18 | -------------------------------------------------------------------------------- /StackProtector/all/sspstrong.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: ssp.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Tue 24 May 2016 08:45:54 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | #include 11 | 12 | struct no_chars { 13 | unsigned int len; 14 | unsigned int data; 15 | }; 16 | 17 | int main(int argc,const char *argv[]) 18 | { 19 | struct no_chars info = {}; 20 | 21 | if (argc < 3) { 22 | fprintf(stderr, "Usage: %s LENGTH DATA...\n", argv[0]); 23 | return 1; 24 | } 25 | 26 | info.len = atoi(argv[1]); 27 | memcpy(&info.data, argv[2], info.len); 28 | 29 | return 0; 30 | } 31 | -------------------------------------------------------------------------------- /StackProtector/regular/Makefile: -------------------------------------------------------------------------------- 1 | include ../../make.rule 2 | 3 | SECFLAGS = $(STACKREG) 4 | TARGET = ssp sspstrong 5 | 6 | all: $(TARGET) 7 | -------------------------------------------------------------------------------- /StackProtector/regular/ssp.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: ssp.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Tue 24 May 2016 08:45:54 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[5]; 14 | strcpy(buffer, "ABCDE"); 15 | printf("%s\n",buffer); 16 | return 0; 17 | } 18 | -------------------------------------------------------------------------------- /StackProtector/regular/sspstrong.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: ssp.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Tue 24 May 2016 08:45:54 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | #include 11 | 12 | struct no_chars { 13 | unsigned int len; 14 | unsigned int data; 15 | }; 16 | 17 | int main(int argc,const char *argv[]) 18 | { 19 | struct no_chars info = {}; 20 | 21 | if (argc < 3) { 22 | fprintf(stderr, "Usage: %s LENGTH DATA...\n", argv[0]); 23 | return 1; 24 | } 25 | 26 | info.len = atoi(argv[1]); 27 | memcpy(&info.data, argv[2], info.len); 28 | 29 | return 0; 30 | } 31 | -------------------------------------------------------------------------------- /StackProtector/strong/Makefile: -------------------------------------------------------------------------------- 1 | include ../../make.rule 2 | 3 | SECFLAGS = $(STACKSTRONG) 4 | TARGET = ssp sspstrong 5 | 6 | all: $(TARGET) 7 | -------------------------------------------------------------------------------- /StackProtector/strong/ssp.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: ssp.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Tue 24 May 2016 08:45:54 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[5]; 14 | strcpy(buffer, "ABCDE"); 15 | printf("%s\n",buffer); 16 | return 0; 17 | } 18 | -------------------------------------------------------------------------------- /StackProtector/strong/sspstrong.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: ssp.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Tue 24 May 2016 08:45:54 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | #include 11 | 12 | struct no_chars { 13 | unsigned int len; 14 | unsigned int data; 15 | }; 16 | 17 | int main(int argc,const char *argv[]) 18 | { 19 | struct no_chars info = {}; 20 | 21 | if (argc < 3) { 22 | fprintf(stderr, "Usage: %s LENGTH DATA...\n", argv[0]); 23 | return 1; 24 | } 25 | 26 | info.len = atoi(argv[1]); 27 | memcpy(&info.data, argv[2], info.len); 28 | 29 | return 0; 30 | } 31 | -------------------------------------------------------------------------------- /fortify_source/0/Makefile: -------------------------------------------------------------------------------- 1 | include ../../make.rule 2 | 3 | CFLAGS := $(CFLAGS) -O2 4 | SECFLAGS:= $(SECFLAGS) $(FORTIFY0) 5 | TARGET = fortify_source fortify_source1 fortify_source2 fortify_source3 fortify1vs2 6 | 7 | all : $(TARGET) 8 | -------------------------------------------------------------------------------- /fortify_source/0/fortify1vs2.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source1.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 08:22:49 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | struct S { 12 | struct T { 13 | char buf[5]; 14 | int x; 15 | } t; 16 | char buf[20]; 17 | } var; 18 | 19 | int main(int argc,const char *argv[]) 20 | { 21 | strcpy(&var.t.buf[1], argv[1]); 22 | return 0; 23 | } 24 | -------------------------------------------------------------------------------- /fortify_source/0/fortify_source.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 1) { 15 | printf("need one argument"); 16 | } 17 | strcpy(buffer, argv[1]); 18 | return 0; 19 | } 20 | -------------------------------------------------------------------------------- /fortify_source/0/fortify_source1.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 1) { 15 | printf("need one argument"); 16 | } 17 | strcpy(buffer, "abcdefg"); 18 | return 0; 19 | } 20 | -------------------------------------------------------------------------------- /fortify_source/0/fortify_source2.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 1) { 15 | printf("need one argument"); 16 | } 17 | strcpy(buffer, "abcdefghijklmn"); 18 | return 0; 19 | } 20 | -------------------------------------------------------------------------------- /fortify_source/0/fortify_source3.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 2) { 15 | printf("need one argument"); 16 | } 17 | char *p = argv[2]; 18 | char *q = argv[1]; 19 | strcpy(p, q); 20 | return 0; 21 | } 22 | -------------------------------------------------------------------------------- /fortify_source/1/Makefile: -------------------------------------------------------------------------------- 1 | include ../../make.rule 2 | 3 | CFLAGS := $(CFLAGS) -O2 4 | SECFLAGS:= $(SECFLAGS) $(FORTIFY1) 5 | TARGET = fortify_source fortify_source1 fortify_source2 fortify_source3 fortify1vs2 6 | 7 | all : $(TARGET) 8 | -------------------------------------------------------------------------------- /fortify_source/1/fortify1vs2.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source1.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 08:22:49 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | struct S { 12 | struct T { 13 | char buf[5]; 14 | int x; 15 | } t; 16 | char buf[20]; 17 | } var; 18 | 19 | int main(int argc,const char *argv[]) 20 | { 21 | strcpy(&var.t.buf[1], argv[1]); 22 | return 0; 23 | } 24 | -------------------------------------------------------------------------------- /fortify_source/1/fortify_source.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 1) { 15 | printf("need one argument"); 16 | } 17 | strcpy(buffer, argv[1]); 18 | return 0; 19 | } 20 | -------------------------------------------------------------------------------- /fortify_source/1/fortify_source1.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 1) { 15 | printf("need one argument"); 16 | } 17 | strcpy(buffer, "abcdefg"); 18 | return 0; 19 | } 20 | -------------------------------------------------------------------------------- /fortify_source/1/fortify_source2.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 1) { 15 | printf("need one argument"); 16 | } 17 | strcpy(buffer, "abcdefghijklmn"); 18 | return 0; 19 | } 20 | -------------------------------------------------------------------------------- /fortify_source/1/fortify_source3.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 2) { 15 | printf("need one argument"); 16 | } 17 | char *p = argv[2]; 18 | char *q = argv[1]; 19 | strcpy(p, q); 20 | return 0; 21 | } 22 | -------------------------------------------------------------------------------- /fortify_source/2/Makefile: -------------------------------------------------------------------------------- 1 | include ../../make.rule 2 | 3 | CFLAGS := $(CFLAGS) -O2 4 | SECFLAGS:= $(SECFLAGS) $(FORTIFY2) 5 | TARGET = fortify_source fortify_source1 fortify_source2 fortify_source3 fortify1vs2 6 | 7 | all : $(TARGET) 8 | -------------------------------------------------------------------------------- /fortify_source/2/fortify1vs2.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source1.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 08:22:49 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | struct S { 12 | struct T { 13 | char buf[5]; 14 | int x; 15 | } t; 16 | char buf[20]; 17 | } var; 18 | 19 | int main(int argc,const char *argv[]) 20 | { 21 | strcpy(&var.t.buf[1], argv[1]); 22 | return 0; 23 | } 24 | -------------------------------------------------------------------------------- /fortify_source/2/fortify_source.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 1) { 15 | printf("need one argument"); 16 | } 17 | strcpy(buffer, argv[1]); 18 | return 0; 19 | } 20 | -------------------------------------------------------------------------------- /fortify_source/2/fortify_source1.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 1) { 15 | printf("need one argument"); 16 | } 17 | strcpy(buffer, "abcdefg"); 18 | return 0; 19 | } 20 | -------------------------------------------------------------------------------- /fortify_source/2/fortify_source2.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 1) { 15 | printf("need one argument"); 16 | } 17 | strcpy(buffer, "abcdefghijklmn"); 18 | return 0; 19 | } 20 | -------------------------------------------------------------------------------- /fortify_source/2/fortify_source3.c: -------------------------------------------------------------------------------- 1 | /************************************************************************* 2 | > File Name: fortify_source.c 3 | > Author: mudongliang 4 | > Mail: mudongliangabcdi@163.com 5 | > Created Time: Wed 25 May 2016 06:01:12 PM EDT 6 | ************************************************************************/ 7 | 8 | #include 9 | #include 10 | 11 | int main(int argc,const char *argv[]) 12 | { 13 | char buffer[10]; 14 | if (argc < 2) { 15 | printf("need one argument"); 16 | } 17 | char *p = argv[2]; 18 | char *q = argv[1]; 19 | strcpy(p, q); 20 | return 0; 21 | } 22 | -------------------------------------------------------------------------------- /fortify_source/Makefile: -------------------------------------------------------------------------------- 1 | DIRS = 0 1 2 2 | 3 | all: 4 | $(foreach dir,$(DIRS),$(MAKE) -C $(dir);) 5 | 6 | clean: 7 | $(foreach dir,$(DIRS),$(MAKE) clean -C $(dir);) 8 | -------------------------------------------------------------------------------- /fortify_source/README.md: -------------------------------------------------------------------------------- 1 | [FORTIFY_SOURCE Examples](http://mudongliang.github.io/2016/05/25/fortify_source-examples.html) 2 | 3 | [Enhance application security with FORTIFY_SOURCE](http://mudongliang.github.io/2016/05/25/enhance-application-security-with-fortify_source.html) 4 | 5 | -------------------------------------------------------------------------------- /make.rule: -------------------------------------------------------------------------------- 1 | # Stack is Executable 2 | EXECSTACK = -z execstack 3 | 4 | # Stack Protector Options 5 | STACKPNO = -fno-stack-protector 6 | STACKREG = -fstack-protector 7 | STACKSTRONG = -fstack-protector-strong 8 | STACKALL = -fstack-protector-all 9 | 10 | # FORTIFY_SOURCE Options 11 | FORTIFY0 = -D_FORTIFY_SOURCE=0 12 | # Same as -U_FORTIFY_SOURCE 13 | FORTIFY1 = -D_FORTIFY_SOURCE=1 14 | FORTIFY2 = -D_FORTIFY_SOURCE=2 15 | 16 | # Compile options 17 | CC = gcc 18 | CFLAGS = -Wall -Wextra -ggdb -pie -fPIE 19 | SECFLAGS = $(STACKPNO) 20 | 21 | .PHONY: all clean 22 | 23 | all : $(TARGET) 24 | 25 | %.S : %.c 26 | $(CC) -S $(CFLAGS) $(SECFLAGS) -o $@ $< 27 | 28 | % : %.c 29 | $(CC) $(CFLAGS) $(SECFLAGS) -o $@ $< 30 | 31 | clean : 32 | rm -rf $(TARGET) 33 | rm -rf *.S 34 | --------------------------------------------------------------------------------