ITPUB
ITPUB
Mar 23, 2016 · Information Security

How Malicious ELF Files Evade IDA Pro and What You Can Do About It

The article reveals a novel ELF‑binary manipulation technique that prevents IDA Pro from loading malicious Linux samples, demonstrates reconstruction steps with hex editors, compares other disassemblers, and provides YARA rules and a GitHub script for detection and remediation.

IDA ProLinux securityYARA
0 likes · 5 min read
How Malicious ELF Files Evade IDA Pro and What You Can Do About It