crates.io license

Analyzer of security features in executable binaries

binary-security-check is a command line utility that analyses executable binaries looking for features that make the executable more secure, or less prone to some vulnerabilities.

Installation instructions

In order to use this tool on your computer, you need to build it from sources:

  1. If you don't have a Rust toolchain installed, then install one. I recommend to install the latest stable toolchain for your computer.

  2. Install a C toolchain for your computer. For example on Debian Linux: sudo apt-get install build-essential

  3. Build the sources: cargo install binary-security-check

  4. You should be able to run the tool directly: binary-security-check -h

Supported formats

Different executable formats are currently supported:

Reported security features:

The list of security features analyzed by binary-security-check depends on the analyzed format. Each security feature has a keyword identifying it in the report.

For the ELF format, the analyzed features are:

For the Archive format, the analyzed features are:

For PE32 and PE32+ formats, the analyzed features are:

Reporting format

The program can analyze multiple binary files. For each file, it displays the file path, and the status of the checked security features.

The status of the security feature in the binary is indicated by a letter before the keyword: - + means the feature is present/supported. - ! means the feature is absent/unsupported. - ~ means the feature is probably present/supported. - ? means the feature status is unknown.

For example, !ASLR means the binary does not support Address Space Layout Randomization.

Command line

``` Usage: binary-security-check [-v] [-c COLOR] [(-s DIR | -l FILE | -i SPEC)] ... binary-security-check (-h | --help) binary-security-check --version

Options: -c COLOR, --color=COLOR Use color in standard output. Either 'auto' or 'always' or 'never' [default: auto]. -s DIR, --sysroot=DIR Set system root for finding the corresponding C runtime library. -l FILE, --libc=FILE Set the path of the C runtime library. -i SPEC, --libc-spec=SPEC Use an internal list of checked functions as specified by a specification. -v, --verbose Verbose logging. -h, --help Show this screen. --version Show version.

If specified, then SPEC can be one of the following versions of the Linux Standard Base specifications: - lsb1: LSB 1.0.0. - lsb1dot1: LSB 1.1.0. - lsb1dot2: LSB 1.2.0. - lsb1dot3: LSB 1.3.0. - lsb2: LSB 2.0.0. - lsb2dot0dot1: LSB 2.0.1. - lsb2dot1: LSB 2.1.0. - lsb3: LSB 3.0.0. - lsb3dot1: LSB 3.1.0. - lsb3dot2: LSB 3.2.0. - lsb4: LSB 4.0.0. - lsb4dot1: LSB 4.1.0. - lsb5: LSB 5.0.0.

By default, this tool tries to automatically locate the C library in the following directories: - /lib/ - /usr/lib/ - /lib64/ - /usr/lib64/ - /lib32/ - /usr/lib32/ The tools readelf and ldd can be used to help find the path of the C library needed by the analyzed files, which is given by the --libc parameter. ```

Miscellaneous features

License

Copyright 2018-2023 Koutheir Attouchi. See the LICENSE.txt file at the top-level directory of this distribution. Licensed under the the MIT license. This file may not be copied, modified, or distributed except according to those terms.