/usr/lib/python2.7/dist-packages/volatility/plugins/mac/check_trap_table.py is in volatility 2.3.1-7.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | # Volatility
# Copyright (C) 2007-2013 Volatility Foundation
#
# This file is part of Volatility.
#
# Volatility is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License Version 2 as
# published by the Free Software Foundation. You may not use, modify or
# distribute this program under any other version of the GNU General
# Public License.
#
# Volatility is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Volatility. If not, see <http://www.gnu.org/licenses/>.
#
"""
@author: Andrew Case
@license: GNU General Public License 2.0
@contact: atcuno@gmail.com
@organization:
"""
import volatility.obj as obj
import volatility.plugins.mac.common as common
class mac_check_trap_table(common.AbstractMacCommand):
""" Checks to see if mach trap table entries are hooked """
def _set_vtypes(self):
x86_10_vtypes = {
'mach_trap' : [ 16, {
'mach_trap_function': [ 4, ['pointer', ['void']]]
}]}
x86_other_vtypes = {
'mach_trap' : [ 8, {
'mach_trap_function': [ 4, ['pointer', ['void']]]
}]}
x64_10_vtypes = {
'mach_trap' : [ 40, {
'mach_trap_function': [ 8, ['pointer', ['void']]]
}]}
x64_other_vtypes = {
'mach_trap' : [ 16, {
'mach_trap_function': [ 8, ['pointer', ['void']]]
}]}
arch = self.addr_space.profile.metadata.get('memory_model', '32bit')
major = self.addr_space.profile.metadata.get('major', 0)
if arch == "32bit":
if major == 10:
vtypes = x86_10_vtypes
else:
vtypes = x86_other_vtypes
else:
if major == 10:
vtypes = x64_10_vtypes
else:
vtypes = x64_other_vtypes
self.addr_space.profile.vtypes.update(vtypes)
self.addr_space.profile.compile()
def calculate(self):
common.set_plugin_members(self)
self._set_vtypes()
sym_addrs = self.profile.get_all_addresses()
table_addr = self.addr_space.profile.get_symbol("_mach_trap_table")
ntraps = obj.Object("int", offset = self.addr_space.profile.get_symbol("_mach_trap_count"), vm = self.addr_space)
traps = obj.Object(theType = "Array", offset = table_addr, vm = self.addr_space, count = ntraps, targetType = "mach_trap")
for (i, trap) in enumerate(traps):
ent_addr = trap.mach_trap_function.v()
if not ent_addr:
continue
hooked = ent_addr not in sym_addrs
if hooked == False:
sym_name = self.profile.get_symbol_by_address("kernel", ent_addr)
else:
sym_name = "HOOKED"
yield (table_addr, "TrapTable", i, ent_addr, sym_name, hooked)
def render_text(self, outfd, data):
self.table_header(outfd, [("Table Name", "15"),
("Index", "6"),
("Address", "[addrpad]"),
("Symbol", "<50")])
for (_, table_name, i, call_addr, sym_name, _) in data:
self.table_row(outfd, table_name, i, call_addr, sym_name)
|