• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Reverse Engineering Closed Source GNU/Linux Software

By Abhishek Ghosh May 26, 2015 9:32 am Updated on May 26, 2015

Reverse Engineering Closed Source GNU/Linux Software

Advertisement

Reverse Engineering Closed Source GNU/Linux Software is Needed For Checking For Spyware and Other Malware in the Binary in Absence of Source Code. First of all, these closed source softwares, softwares with dubious license, softwares with an ill-defined phrase open source should not be used to give the Governmental agencies to run mass surveillance.

 

Why We Reverse Engineering Closed Source GNU/Linux Software?

 

Reverse engineering closed source GNU/Linux software is usually marked as illegal by most of the Governments and their malware distributing privately owned companies functioning as agents. Both of them, with obvious reason, try their best to stop running reverse engineering. Free Software will provide the Freedom of using the software plus testing the source code, modifying it etc. So, release of reverse engineered software after patching directly is dangerous from the legal perspective, it is limited to usage for academic purpose or for re-writing a Free Software with similar functions.

It is near impossible to stop personal reverse engineering of the closed source software. Software also includes the firmwares.

Advertisement

---

Distributing Free Software never decreases the profit – like WordPress is a Free Software and Matt Mullenweg as founder is quite successful. Everyday we use a huge number of softwares which are 100% closed source and either keep a security backdoor open to help NSA like Governmental Agencies or has data collecting functions. It can be 5 lines of innocent looking Javascript. Reverse Engineering demands huge knowledge of various languages, experience, enthusiasm and certain tools.

The philosophy is not to create warez. Warez do not promote the Free Software culture.

A burglar opening a safe that is a computer screen

 

Using OpenStack Snapshot as a Tool for Reverse Engineering Closed Source GNU/Linux Software

 

OpenStack has snapshot feature with Floating IP. Some providers have virtual routers too. Blocking the external network is very important basic step for testing the questionable softwares to be reverse engineering.

Usually the closed source software has some restrictive function and some usage tracking future. They can use your instances to spy on you. In real bigger testing, instead of virtual devices, real hardwares are used. This mentioned method can be an example to work for security and gain experience with near zero knowledge.

Nulling the apparent restrictive function and some usage tracking future are the initial steps to find the other malware functions, which are usually very difficult to find.

As none of the Closed Source GNU/Linux Software is neither being used on production instance for any benefit nor they are distributed, the so called Governmental Laws are avoided. For bigger softwares, keeping Free Software communities informed is a better idea.

Decompiling, editing the files and recompiling are the first corrective steps. The deb or rpm installer file almost always remains in the machine/virtual machine. Finding it and fixing it to work is not difficult. Difficult are the next steps. Because Closed Source GNU/Linux Software never supply the source code. The things are binary. It is important to know which language it is written – C, C++, Python etc.

ltrace is very important tool for tracing. We can install it on deb GNU/Linux with :

Vim
1
apt-get install ltrace

 

Reverse Engineering Closed Source GNU/Linux Software

 

Best source for the beginners is http://www.ouah.org/RevEng/(copy paste the url in text editor first). Create a steal directory under /var/log with any name you can remember, like debug. You need to trace the system calls in this way :

Vim
1
ltrace -S closed-source-program

and keep the logs. Although netstat npa gives an idea of the external communication, closed source softwares are infamous for abusing system files to hide their malware functions.

After fixing the basic issues, practically we need to convert that Binary to Source Code. This is tad hard. That is why, usually the softwares are re-written in Python or other sane Language. C and C++ are favorite languages of the closed source software manufactures. Both makes the steps dirty. Here you’ll get some idea :

Vim
1
http://tldp.org/HOWTO/html_single/Debian-Binary-Package-Building-HOWTO/

For DEB, we can use dpkg -x for closed_source.deb named software.

Vim
1
2
3
4
dpkg -x  closed_source.deb /tmp/test
ls /tmp/test
ar -vx closed_source.deb
tar -xvzf data.tar.gz

Do not except a clean C or C++ language, their software engineers might not be enlighten, but are masters to create a confusing “language”. Payment actually never build “proof stuffs”. Human has a pattern of writing codes. Never try anything without basic knowledge.

Tagged With gnu linux reverse engineering , linux reverse close source , linux reverse engineering software , reverse engineer GNU software , reverse engineering closed source , reverse engineering linux source software , reversing closed source software

This Article Has Been Shared 826 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Reverse Engineering Closed Source GNU/Linux Software

  • fish Shell : The Friendly Interactive Shell

    fish Shell is Really a Friendly Interactive Shell Which Be Used on GNU/Linux, OS X or UNIX Systems. fish is a user-friendly and Exotic Shell.

  • Must Know GNU/Linux Commands For the SSH Users

    Here Are Some Must Know GNU/Linux Commands For the SSH Users Who Are Relatively Newer and Primarily Managing Own Servers to Run their Websites.

  • What is Load Average in GNU/Linux?

    If We Run Top Command, We Can See a Parameter Load Average. What is Load Average in GNU/Linux? Why we need to know this load average for a server?

  • Install Command Line File Manager on Ubuntu Server

    Midnight Commander Has a Text Based User Interface & Can Be Used on All OS. Here is How To Install Command Line File Manager on Ubuntu Server.

  • Edit SSH After Login Info (MOTD) on Deb GNU/Linux

    Edit SSH After Login Info i.e. MOTD on Deb GNU/Linux including Execution of Scripts. In Post PRISM Acknowledged Era, Functions Has Been Changed.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (20K Followers)
  • Twitter (4.9k Followers)
  • Facebook (5.8k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.2k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • A.I. Bingo Game for Teaching A.I. January 27, 2021
  • Blackjack Strategies, AI and Cognitive Science January 27, 2021
  • Wi-Fi for Old House With Thick Walls January 26, 2021
  • What is Inertial Navigation System? January 25, 2021
  • What is Miniaturization? January 24, 2021

 

About This Article

Cite this article as: Abhishek Ghosh, "Reverse Engineering Closed Source GNU/Linux Software," in The Customize Windows, May 26, 2015, January 27, 2021, https://thecustomizewindows.com/2015/05/reverse-engineering-closed-source-gnulinux-software/.

Source:The Customize Windows, JiMA.in

 

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy