Provides ability to use ptrace to execute functions in remote processes. Mostly for runtime shared library injection.
Yaui (Yet another unix injector...)
```rust use libc::pidt; use procmaps::MapRange; use ptrace_do::{ProcessIdentifier, RawProcess, TracedProcess};
fn findmodmapfuzzy(modname: &str, process: &impl ProcessIdentifier) -> Option
pub fn findremoteprocedure(
modname: &str,
ownedprocess: &impl ProcessIdentifier,
remoteprocess: &impl ProcessIdentifier,
functionaddress: usize,
) -> Option
let remote_module = find_mod_map_fuzzy(mod_name, remote_process)?;
tracing::info!(
"Identifed remote range {mod_name:?} ({:?}) at {:X?}",
remote_module.filename(),
remote_module.start()
);
Some(function_address - internal_module.start() + remote_module.start())
}
fn main() -> Result<(), Box
let target_pid: pid_t = 7777;
let traced_process = TracedProcess::attach(RawProcess::new(target_pid))?;
// OwnedProcess / Die on detach
//
// let process = OwnedProcess::from(
// std::process::Command::new(executable_path)
// .spawn()
// .expect("spawn"));
//
// let traced_process = TracedProcess::attach(process)?;
tracing::info!("Successfully attached to the process");
let libc_path = "libc";
let getpid_remote_procedure = find_remote_procedure(
libc_path,
&RawProcess::new(std::process::id() as pid_t),
&traced_process,
libc::getpid as usize,
)
.unwrap();
tracing::info!("Found remote getpid procedure at : {getpid_remote_procedure:X?}");
let frame = traced_process.next_frame()?;
tracing::info!("Successfully waited for a frame");
let (regs, _frame) = frame.invoke_remote(getpid_remote_procedure, 0, &[])?;
tracing::info!("Successfully executed remote getpid");
let traceed_pid = regs.return_value() as pid_t;
tracing::info!("The return value (Traceed Pid) was {}", traceed_pid);
Ok(())
} ```