Recent work has been compiled shell script to the customer use, will inevitably encounter some sensitive information do not want to let customers know, so the SHC script encryption method compiled binary file submitted to the customer use, found that SHC encryption will appear to the fate of the vulnerability. This article describes the vulnerability method:
SHC version: shc-3.8.3
Shell script code Volume: 300 lines +
Shell script logic processing is more complex
SHC compilation parameters: Shc-v-t-r-F (specific meaning can be found online, no longer stated here)
Because the shell script code is more, and the logic processing is slightly complex, each time the execution of the PS process will always see the shell script code, always be plagued by this vulnerability, as shown in:
TEST_V12 for a script-compiled binary file execution:
Open a shell window during execution to see the PS process, as shown below (due to information-sensitive, truncated partial script description):
the above two graphs can fully illustrate that SHC encryption is not so reliable when the amount of shell script is slightly more or the logic is slightly more complex.
Original statement: This document is produced so that the content is original, not reproduced, author e-mail: [Email protected]
Shell Encryption SHC Vulnerability