Skip to content

This is a plugin designed to help IoT security researchers locate which dynamic library a target function belongs to within a root filesystem (rootfs).

License

Notifications You must be signed in to change notification settings

NoneShell/function_locator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Function Locator

This is a plugin designed to help IoT security researchers locate which dynamic library a target function belongs to within a root filesystem (rootfs).

Usage

  1. Click Edit -> Plugins -> Function Locator to trigger the plugin. alt text
  2. In the pop-up window, enter the absolute path of the rootfs. The plugin will be initialized at this point. alt text
  3. In IDA's decompilation or disassembly window, right-click, and then click Locate function in rootfs from the pop-up menu. alt text
  4. The results will be displayed both in a pop-up window showing the path of the dynamic library relative to the rootfs, and in the command window displaying the absolute path of the dynamic library. alt text

Install

This plugin uses pyelftools to parse dynamic libraries (I also tried using IDAPython's own APIs, but they were not very convenient). Use the Python 3 version that your IDA uses to install it:

python3 -m pip install pyelftools

then move function_locator.py into your IDA plugins directory

Contribution

If you encounter any issues, have suggestions for improvements, or want to add new features, please submit an issue or a pull request. If you have any other questions, please feel free to ask.

About

This is a plugin designed to help IoT security researchers locate which dynamic library a target function belongs to within a root filesystem (rootfs).

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages