| ▲ | wasmperson 7 hours ago | |
I extracted the linux executable and was surprised to find that both readelf and objdump choke on it despite it loading and running correctly. Some investigation reveals that the name of the dynamic linker was shoved into the "unused" fields in the PT_DYNAMIC header entry to save space:
Two questions:1. Was this done manually or is there a tool you're using which does this? I see other size-reduction tricks in here as well. 2. Does anybody know of a tool for examining executables which doesn't crap out on binaries like this? | ||
| ▲ | saidnooneever 25 minutes ago | parent | next [-] | |
ndisasm can help read it and hex editor. no tools should mangle such format, its useless savings, worth nothing. it will cause problem with AV and other things potentially. saw some comments about DEP on windows and this and honestly i wouldnt touch this thing with a 10ft stick. if the creator want ppl to play it they can provide a normal binary. not some obfuscated mess. | ||
| ▲ | oguz-ismail2 5 hours ago | parent | prev [-] | |
Choke how? Both work fine here | ||