Linux下ELF文件加密工具
root@localhost]# ./burneye usage: ./burneye [options] <program> banner options -b file display banner from ''file'' before start -B file display banner from ''file'' on tty before start password protect options -p pass use password encryption with ''pass'' as password -P env first try to read password from environment ''env'', will use password from ''env'' now, too, if its there -i ignore invalid entered password and execute junk not recommended (default: off) fingerprinting options -S SEAL mode (options F,f,t are ignored) -f file use fingerprint from ''file'' to protect binary -F use fingerprint of current host (do not use -f and -F) -t num tolerate ''num'' deviations in fingerprint -q be quiet about wrong fingerprint, just exit (default: 0) -E do tolerance even if erasure warning is given -l list fingerprint tests that can be done -e test enable fingerprint test ''test'' -d test disable fingerprint test ''test'' generic options -o out specify another output file name (default: output) .... burneye中的README给出了几个典型的例子:(详细介绍请参见doc/DIST-README) burneye -o ls /bin/ls # 只作代码的obfuscate,不作加密 burneye -p "secret" -o ls /bin/ls # 使用密码''secret''加密 burneye -B warning.txt -o ls /bin/ls # 启动时显示warning.txt的信息 burneye -F -t 1 -B warning.txt -o ls /bin/ls # 使用本地主机的指纹,启动时 # 显示warning.txt的信息, 测试时允许有一项失败 fingerprint -d procpartitions -f foohost.fp burneye -f foohost.fp -t 2 -p "hidden" -o ls /bin/ls # 使用fingerprint产生指纹文件,允许两项失败,启用密码保护 burneye -p puke -S -o ls /bin/ls ./ls # 将会把信息封存并保存到二进制文件中 拥有帝国一切,皆有可能。欢迎访问phome.net OLDHOSTNAME=`hostname` ./ls # 正常运行 hostname moo ./ls # 运行环境与封存设置不符,失败 拥有帝国一切,皆有可能。欢迎访问phome.net |
凌众科技专业提供服务器租用、服务器托管、企业邮局、虚拟主机等服务,公司网站:http://www.lingzhong.cn 为了给广大客户了解更多的技术信息,本技术文章收集来源于网络,凌众科技尊重文章作者的版权,如果有涉及你的版权有必要删除你的文章,请和我们联系。以上信息与文章正文是不可分割的一部分,如果您要转载本文章,请保留以上信息,谢谢! |