• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Reverse Engineering Closed Source GNU/Linux Software

By Abhishek Ghosh May 26, 2015 9:32 am Updated on May 26, 2015

Reverse Engineering Closed Source GNU/Linux Software

Advertisement

Reverse Engineering Closed Source GNU/Linux Software is Needed For Checking For Spyware and Other Malware in the Binary in Absence of Source Code. First of all, these closed source softwares, softwares with dubious license, softwares with an ill-defined phrase open source should not be used to give the Governmental agencies to run mass surveillance.

 

Why We Reverse Engineering Closed Source GNU/Linux Software?

 

Reverse engineering closed source GNU/Linux software is usually marked as illegal by most of the Governments and their malware distributing privately owned companies functioning as agents. Both of them, with obvious reason, try their best to stop running reverse engineering. Free Software will provide the Freedom of using the software plus testing the source code, modifying it etc. So, release of reverse engineered software after patching directly is dangerous from the legal perspective, it is limited to usage for academic purpose or for re-writing a Free Software with similar functions.

It is near impossible to stop personal reverse engineering of the closed source software. Software also includes the firmwares.

Advertisement

---

Distributing Free Software never decreases the profit – like WordPress is a Free Software and Matt Mullenweg as founder is quite successful. Everyday we use a huge number of softwares which are 100% closed source and either keep a security backdoor open to help NSA like Governmental Agencies or has data collecting functions. It can be 5 lines of innocent looking Javascript. Reverse Engineering demands huge knowledge of various languages, experience, enthusiasm and certain tools.

The philosophy is not to create warez. Warez do not promote the Free Software culture.

A burglar opening a safe that is a computer screen

 

Using OpenStack Snapshot as a Tool for Reverse Engineering Closed Source GNU/Linux Software

 

OpenStack has snapshot feature with Floating IP. Some providers have virtual routers too. Blocking the external network is very important basic step for testing the questionable softwares to be reverse engineering.

Usually the closed source software has some restrictive function and some usage tracking future. They can use your instances to spy on you. In real bigger testing, instead of virtual devices, real hardwares are used. This mentioned method can be an example to work for security and gain experience with near zero knowledge.

Nulling the apparent restrictive function and some usage tracking future are the initial steps to find the other malware functions, which are usually very difficult to find.

As none of the Closed Source GNU/Linux Software is neither being used on production instance for any benefit nor they are distributed, the so called Governmental Laws are avoided. For bigger softwares, keeping Free Software communities informed is a better idea.

Decompiling, editing the files and recompiling are the first corrective steps. The deb or rpm installer file almost always remains in the machine/virtual machine. Finding it and fixing it to work is not difficult. Difficult are the next steps. Because Closed Source GNU/Linux Software never supply the source code. The things are binary. It is important to know which language it is written – C, C++, Python etc.

ltrace is very important tool for tracing. We can install it on deb GNU/Linux with :

Vim
1
apt-get install ltrace

 

Reverse Engineering Closed Source GNU/Linux Software

 

Best source for the beginners is http://www.ouah.org/RevEng/(copy paste the url in text editor first). Create a steal directory under /var/log with any name you can remember, like debug. You need to trace the system calls in this way :

Vim
1
ltrace -S closed-source-program

and keep the logs. Although netstat npa gives an idea of the external communication, closed source softwares are infamous for abusing system files to hide their malware functions.

After fixing the basic issues, practically we need to convert that Binary to Source Code. This is tad hard. That is why, usually the softwares are re-written in Python or other sane Language. C and C++ are favorite languages of the closed source software manufactures. Both makes the steps dirty. Here you’ll get some idea :

Vim
1
http://tldp.org/HOWTO/html_single/Debian-Binary-Package-Building-HOWTO/

For DEB, we can use dpkg -x for closed_source.deb named software.

Vim
1
2
3
4
dpkg -x  closed_source.deb /tmp/test
ls /tmp/test
ar -vx closed_source.deb
tar -xvzf data.tar.gz

Do not except a clean C or C++ language, their software engineers might not be enlighten, but are masters to create a confusing “language”. Payment actually never build “proof stuffs”. Human has a pattern of writing codes. Never try anything without basic knowledge.

Tagged With get source code of closed software in reverse engineering , gnu linux reverse engineering , linux reverse close source , linux reverse engineering software , reverse engineer GNU software , reverse engineering closed source , reverse engineering linux source software , reversing closed source software

This Article Has Been Shared 881 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Reverse Engineering Closed Source GNU/Linux Software

  • fish Shell : The Friendly Interactive Shell

    fish Shell is Really a Friendly Interactive Shell Which Be Used on GNU/Linux, OS X or UNIX Systems. fish is a user-friendly and Exotic Shell.

  • Must Know GNU/Linux Commands For the SSH Users

    Here Are Some Must Know GNU/Linux Commands For the SSH Users Who Are Relatively Newer and Primarily Managing Own Servers to Run their Websites.

  • What is Load Average in GNU/Linux?

    If We Run Top Command, We Can See a Parameter Load Average. What is Load Average in GNU/Linux? Why we need to know this load average for a server?

  • Install Command Line File Manager on Ubuntu Server

    Midnight Commander Has a Text Based User Interface & Can Be Used on All OS. Here is How To Install Command Line File Manager on Ubuntu Server.

  • Edit SSH After Login Info (MOTD) on Deb GNU/Linux

    Edit SSH After Login Info i.e. MOTD on Deb GNU/Linux including Execution of Scripts. In Post PRISM Acknowledged Era, Functions Has Been Changed.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023
  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023
  • What is a Data Mesh? January 25, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Reverse Engineering Closed Source GNU/Linux Software," in The Customize Windows, May 26, 2015, January 31, 2023, https://thecustomizewindows.com/2015/05/reverse-engineering-closed-source-gnulinux-software/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT