代码搜索:execve
找到约 549 项符合「execve」的源代码
代码结果 549
www.eeworm.com/read/136812/5857358
makefile
#
# @(#)Makefile 1.1 92/07/30 SMI
#
# Copyright (c) 1987 by Sun Microsystems, Inc.
#
SRC = access.c acct.c chdir.c chmod.c chown.c chroot.c creat.c execve.c \
getgroups.c getpgrp.c kill.c link.c
www.eeworm.com/read/131315/5933855
badcref3
Thu Jul 28 15:27:15 PDT 1983
040(8)
Execve(2)
Fopen(3S)
Fseek(3S)
fIfcntlfP(2)
fIfflushfP(3)
fIsetitimerfP(2)
fIsetrlimitfP(2)
access(3F)
exec(2)
fclose(3s /usr/man/man3/ferror.3s /usr/man/man3/fread
www.eeworm.com/read/278507/10530939
1 truss.unixware.2.1
execve("./daytimetcpcli", 0x08047BA8, 0x08047BB4) argc = 2
open("/usr/lib/libsocket.so.2", O_RDONLY, 0) = 3
fxstat(2, 3, 0x0804794C) = 0
mmap(0x00000000, 4096, PROT_READ, MAP_SHARED, 3, 0) = 0xBFF9
www.eeworm.com/read/408584/11380731
1 truss.unixware.2.1
execve("./daytimetcpcli", 0x08047BA8, 0x08047BB4) argc = 2
open("/usr/lib/libsocket.so.2", O_RDONLY, 0) = 3
fxstat(2, 3, 0x0804794C) = 0
mmap(0x00000000, 4096, PROT_READ, MAP_SHARED, 3, 0) = 0xBFF9
www.eeworm.com/read/290808/3970984
1 truss.unixware.2.1
execve("./daytimetcpcli", 0x08047BA8, 0x08047BB4) argc = 2
open("/usr/lib/libsocket.so.2", O_RDONLY, 0) = 3
fxstat(2, 3, 0x0804794C) = 0
mmap(0x00000000, 4096, PROT_READ, MAP_SHARED, 3, 0) = 0xBFF9
www.eeworm.com/read/394442/8224303
c exploit1.c
char shellcode[]=
// setreuid(0,0);
"\x31\xc0" // xor %eax,%eax
"\x31\xdb" // xor %ebx,%ebx
"\x31\xc9" // xor %ecx,%ecx
"\xb0\x46" // mov $0x46,%al
"\xcd\x80" // int $0x80
// execve /bi
www.eeworm.com/read/178758/5314591
entries
/crt0.c/1.4/Wed Mar 9 14:33:31 2005//
/execve.c/1.2/Mon Apr 25 23:40:28 2005//
/exit.c/1.2/Sun Jan 16 19:00:34 2005//
/io.c/1.7/Mon May 30 21:53:06 2005//
/isatty.c/1.1.1.1/Thu Jan 6 21:48:03 2005//
www.eeworm.com/read/261052/4325845
dlm linkhttp.dlm
CHTA.dlm
DLMVERSION()
CSTRTD(40)
CINET640
buildmark.o
modules.o
ap/ap_base64.o
ap/ap_checkpass.o
ap/ap_cpystrn.o
ap/ap_ebcdic.o
ap/ap_execve.o
ap/ap_fnmatch.o
ap/ap_getpass.o
ap/ap_md5c.o
ap/ap_sh
www.eeworm.com/read/223355/14643850
txt 漫谈兼容内核之九:elf映像的装入(二).txt
漫谈兼容内核之九:ELF映像的装入(二)
[align=center][size=4][b]漫谈兼容内核之九:ELF映像的装入(二)[/b][/size][/align]
[align=center]毛德操[/align]
上一篇漫谈介绍了在通过execve()系统调用启动一个ELF格式的目标映像时发生于Linux内核中的活动。简而言之,内核根据映像头部所提供的信息把目标映像