PyDA icon indicating copy to clipboard operation
PyDA copied to clipboard

Plugin Idea: Identify Possible Vulns

Open direwolf314 opened this issue 11 years ago • 0 comments

Could operate in a couple different ways:

  1. The plugin maintains a list of 'known vulnerable functions'. It then scans the binary and makes a list of any calls to those functions and their addresses for further investigation.
  2. The plugin has a list of functions that it knows return input from a user (gets/socket recv/etc.) and similarly reports them for further investigation.

direwolf314 avatar May 05 '14 15:05 direwolf314