Zeroska
  • 🐱Zeroska - The Bold
  • Computer/Cyber Security
    • ⭐Fresh off the boat - for new Blue Teamer/ SOC Analyst
    • 💀Necromancer (DFIR)
      • 🕵️DFIR and DFIR case
        • 🗃️Case Files
          • Misconfiguration 0x01
      • 📔My own DFIR notes
        • The Mark of The Web (MOTW)
        • LNK Shortcut
        • Prefetch, AmCache, ShimCache in Windows
        • Malicious Document (VBA, Office, PDF, ...)
        • SRUM (System Resource Usage Monitor)
        • Volatility notes
        • Understand Logon Session in Windows
        • "Very" Hidden sheets in Excel
        • Hidden Processes
      • 📔Notes
        • Useful Resources
        • Useful Resources DFIR
        • Saved Content (Backup for the OG content get deleted)
          • How to be best SOC analyst ever
    • 🧙‍♂️Defense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
        • Authentication (Windows Account Life Cycle Events)
      • MS Exchange
      • Windows
    • 💙My Current Blue Team Operation
      • VLAN Monitoring Template
      • Daily Monitoring Report
      • General Playbook
      • JupyterHub Configuration Guide
      • How to train your Blue Team
    • 🏭ICS/OT
      • Setup ICS/OT Simulation Learning Lab
      • Smart Grids
      • Learning Modbus TCP
      • Learning DNP3
      • Resources/Blogs/Links
    • 🥷Threat Intelligence
      • Small Cyber Threat Intelligence Program
      • Intelligence Analysis [VN]
      • OSINT Information Monitoring
        • Telegram Info-Stealer Monitoring
      • C2 Tracker
      • Fake Website Tracker
      • Dark Web Investigation Attempt
      • Threat Intelligence Quick Win
      • Resources/Blogs/Links
  • 😒Computer and Technology
    • My Home Lab Setup
    • 🐴ELK Stack
      • Useful Resources
      • ELK Stack - Container - Docker Compose - AWS ECS
      • ECS - Elastic Common Schema
      • Elasticsearch
      • Logstash
      • Troubleshooting and Problems
    • 🐧Linux
      • Setting up good SSH Authentication
      • Configure Auditd and how to leverage it
      • ELF Format
      • Useful Links
    • 📦Containers
      • Docker container logs is quite big
      • Worth Reading
    • 🪠Splunk Learning Experience
      • Splunk Test Lab
      • Data Collection Tier (How to get the data)
      • SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)
      • Useful Resources
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • 🐳Predators and Preys (Computing)
      • Tracks or Hunting Artifacts
    • 📦Network Packet Analysis
      • The Basic
      • Tshark | Zeek Copy & Paste
      • Network Analysis Resources
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • 🎵In my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - Đồ án hướng ngành A "Hụt" của tôi
Powered by GitBook
On this page
  • Why learn ELF Format?
  • What is it?

Was this helpful?

  1. Computer and Technology
  2. Linux

ELF Format

I'm finally decided to spend 6 months to learn about Linux Malware and all the things related to it, and this is the first step to enter the Linux Malware field -> Learn about ELF Format

Why learn ELF Format?

It is an executable, I don't need to explain about this, the name itself is Executable and Linkable Format, If you want to write a program like "ls" command -> Then have to compile and create ELF file using programming language

A common misconception is that ELF files are just for binaries or executables, it also use fo object code, shared libraries, and core dumps. (it in the spefication of ELF)

To study the ELF Format is to study the way of Linux Programs works, to understand how an operating system works -> that alone will give a skill to do DFIR or malware analysis after all malware are just some software.

What is it?

If you ever use command like "cd", "ls" or "cat",... then you are running an ELF, how do I know that is an ELF. In Linux you can run a command file /bin/ls and it will return something like this

 ELF 64-bit LSB shared object, x86-64, version 1 (SYSV),
 dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, 
 BuildID[sha1]=2f15ad836be3339dec0e2e6a3c637e08e48aacbd, 
 for GNU/Linux 3.2.0, stripped

Wow! That a huge information the command "file" has gave us.

Let's take a look at those:

  • ELF 64-Bit

  • LSB shared object

  • x86-64

  • Version 1(SYSV)

  • dynamically linked

  • Interpreter /lib64/ld-linux-x86-64.so.2

  • BuildID[sha1]=2f15ad836be3339dec0e2e6a3c637e08e48aacbd

  • For GNU/Linux 3.2.0

  • Stripped

Command "file" is a command that going to parse the

PreviousConfigure Auditd and how to leverage itNextUseful Links

Last updated 1 year ago

Was this helpful?

😒
🐧
Page cover image