>>> Выноска ссылки
# страничка shiva
http://www.securereality.com.au/
http://www.securereality.com.au/archives/shiva-0.95.tar.gz
# Neel Mehta Advanced in ELF Runtime Binary Encryption - Shiva
http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-mehta/bh-us-03-mehta.pdf
http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-mehta/bh-us-03-shiva-0.96.tar
#Shaun Clowes A Security Microcosm - Attacking/Defending Shiva, A Linux Executable Encryptor
http://www.blackhat.com/presentations/bh-asia-03/bh-asia-03-halvar.pdf
#Chris Eagle Strike/Counter-Strike: Reverse Engineering Shiva
http://www.blackhat.com/presentations/bh-federal-03/bh-federal-03-eagle/bh-fed-03-eagle.pdf
http://www.blackhat.com/presentations/bh-federal-03/bh-federal-03-eagle/bh-federal-03-eagle.zip
# ida-x86emu
http://sourceforge.net/projects/ida-x86emu
# upx
http://upx.sourceforge.net/
#elfcrypt
http://www.infogreg.com/source-code/public-domain/elfcrypt-v1.0.html
# Burneye ELF encryption program, x86-linux binary, version 1.0 - new year release!
http://packetstorm.linuxsecurity.com/groups/teso/burneye-1.0-linux-static.tar.gz
#Burneye ELF encryption program 1.0.1 with full source and docs.
http://packetstorm.linuxsecurity.com/groups/teso/burneye-1.0.1-src.tar.bz2
# Stripped burneye sources, for educational purposes (beside the speech + article).
http://packetstorm.linuxsecurity.com/groups/teso/burneye-stripped.tar.gz
# TESO Burneye Unwrapper
http://www.securiteam.com/tools/5BP0H0U7PQ.html
# пример защищенного файла
# Модуль перехватывает работу системного вызова brk(), анализирует память
# процесса в контексте которого он работает, и по сигнатуре определяет burneye на
# нужной нам стадии, а потом просто банально дампит дешифрованный elf на диск.
# Ну а дальше всё просто:
# gdb или ltrace..
# И таким образом получаем:
# login=ZincompetenciaZ&password=ZgalopanteZ
http://quiz.ngsec.com/game1/level10/validate_MoD
# как ломанули debian
http://www.debian.org/News/2003/20031202.ru.html
# procdump for linux
# Advances in remote-exec AntiForensics
http://www.phrack.org/phrack/63/p63-0x0c_Process_Dump_and_Binary_Reconstruction.txt
http://www.phrack.org/phrack/63/p63-0x0c_Process_Dump_and_Binary_Reconstruction.txt
http://www.reversing.org/node/view/10
# шифрование в linux
# Next-generation runtime binary encryption using on-demand function extraction
http://www.phrack.org/phrack/63/p63-0x0d_Next_Generation_Runtime_Binary_Encryption.txt
http://www.phrack.org/phrack/63/p63-0x0d_Next_Generation_Runtime_Binary_Encryption.txt
#Armouring the ELF: Binary encryption on the UNIX platform
http://www.phrack.org/show.php?p=58&a=5