首页> 外文期刊>Linux Journal >Limitations of shc, a Shell Encryption Utility
【24h】

Limitations of shc, a Shell Encryption Utility

机译:Shell加密实用程序shc的局限性

获取原文
获取原文并翻译 | 示例
           

摘要

Shc is a popular tool for protecting shell scripts that contain sensitive information such as passwords. Its popularity was driven partly by auditors' concern over passwords in scripts, shc encrypts shell scripts using RC4, makes an executable binary out of the shell script and runs it as a normal shell script. Although the resulting binary contains the encryption password and the encrypted shell script, it is hidden from casual view. At first, I was intrigued by the shc utility (www.datsi.fi.upm.es/~frosal/sources/shc.html) and considered it as a valuable tool in maintaining security of sensitive shell scripts. However, upon further inspection, I was able to extract the original shell script from the she-generated executable for version 3.7. Because the encryption key is stojfed in the binary executable, it is possible for anyone with read access to the executable to recover the original shell script. This article details the process of extracting the original shell executable from the binary generated by shc.
机译:Shc是一种流行的工具,用于保护包含敏感信息(例如密码)的shell脚本。它之所以受欢迎,部分原因是审计师对脚本中的密码有所关注,shc使用RC4加密Shell脚本,从Shell脚本制作可执行二进制文件并将其作为普通Shell脚本运行。尽管生成的二进制文件包含加密密码和加密的Shell脚本,但从临时视图中看不到它。最初,我对shc实用程序(www.datsi.fi.upm.es/~frosal/sources/shc.html)感兴趣,并认为它是维护敏感Shell脚本安全性的宝贵工具。但是,经过进一步检查,我能够从她生成的3.7版可执行文件中提取原始shell脚本。因为加密密钥存储在二进制可执行文件中,所以具有对该可执行文件的读取访问权限的任何人都有可能恢复原始的shell脚本。本文详细介绍了从shc生成的二进制文件中提取原始shell可执行文件的过程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号