/..

#CONTENT

#TOP

.gitignore
32 bytes2024-12-17 21:46
addr2line.cache
24 KiB2024-12-17 19:39
addr2line.py
388 bytes2024-12-17 19:39
addrs.cache
4 KiB2024-12-17 19:39
elfutils.dockerfile
69 bytes2024-12-17 19:39
elfutils.sh
69 bytes2024-12-17 19:39
libc.so.6
6 MiB2024-12-17 19:39
parse.py
1 KiB2024-12-17 19:39
README.mdx
372 bytes2025-02-14 17:29

#libc indirect calls

Indirect calls, jmp reg, jmp qword [reg], call reg, call qword [reg], etc are possibly points for exploitation in the libc. I ran some tests with Codeql to search for indirect calls. While Codeql was able to detect indirect function calls, it was unable to find all of them. Instead I switched to objdump + regex + addr2line based searching.