-
Notifications
You must be signed in to change notification settings - Fork 6.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Importing executable files with auto-detected format exports corrupted binaries #19
Comments
Issue affects ARM binaries too. |
Can confirm. The exported |
Note: Loading as The disassembly after analysis is missing various things ranging from functions not being disassembled to missing Xrefs. It also appears to analyze the binary much faster than when imported as Thus, loading as |
The binary export is not intended to create a valid executable - there is no export for doing this. It simply dumps the memory blocks that exist within Ghidra void of any address placement information. |
@gnooby22 Would be nice if there was a way to imitate the behavior when loading a binary as One would expect that This means that executables as of now can't be nicely patched like in IDA. |
Yeah, |
Once I imported as Raw Binary what can I do to produce the same binary analysis of an ELF? At least to automatically show assembly code. |
@Corallo It sadly does not seem to be possible as of now |
Also have this issue. When I make patches to apps, I can't export a binary without seg fault, nor does it make the change to the underlying binary referenced by the project. |
Same issue here with every binary I have tested. |
Does 9.0.1 fix this? |
@johnalanwoods Don't worry, it won't be long. Imagine all these poor agents at the NSA who can't work because their hacking toy is broken. They won't let this linger long. LOL |
@najamelan it does not appear to be a bug One of the devs (whose account is now deleted) mentioned this:
I doubt this will be "fixed" |
@Ristovski interesting. To me this would seem like a basic feature. The ability to edit the binary and run that binary independently of Ghidra. I’m shocked this is seen as normal behaviour. Even IDA does this. |
@johnalanwoods I agree. I don't see why the binaries loaded as ELF should not export the same way they do when loaded as Raw Binary. I haven't looked into the bundled source code yet, but maybe this could be trivial to fix. |
A few things to add:
|
Thank you for the clarification @ryanmkurtz. It seems unusual to me that, as sophisticated as Ghidra is, it doesn't include this feature. How much utility can there be without being able to generate an edited executable? Anyway, not to worry. Regards, |
Same problem, works with raw binary, doesn't with auto detection. |
So what are people supposed to do without the ability to export a working binary for windows? Re-write the program or? Isn't this the point of reversing an EXE or am I missing something that people are doing better than patching a working binary? |
Great find, almost lost my mind trying to figure it out. |
they are considering this as an "Enhancement feature" |
I just went back to IDA, at least I can export from it easily and I don’t have to run it inside 4 nested VMs to avoid myself being backdoored ;) |
As others have said export works fine when you import as Raw Binary.
Raw badly affects the quality of the disassembly. It makes it really hard to work in.
… On 15 May 2019, at 1:53 p.m., benjaminkoffel ***@***.***> wrote:
As others have said export works fine when you import as Raw Binary.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub <#19?email_source=notifications&email_token=ABHLP4VVQ5LRUIFZCQVIBHDPVQBUDA5CNFSM4G4ADAC2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGODVOR2FA#issuecomment-492641556>, or mute the thread <https://github.com/notifications/unsubscribe-auth/ABHLP4Q5YOBDBPDQ6X5IGCLPVQBUDANCNFSM4G4ADACQ>.
|
Does 9.0.4 fix this? |
No, 9.0.4 is mostly a bug fix release. |
The problem still persists, are you gonna solve it? |
Ghidra 9.1 will add the ability to retain and access the original imported program bytes. This was a key requirement for this type of exporter to be written properly. However, Ghidra 9.1 will not introduce any new exporters. Writing an exporter to take a loaded memory image back to a runnable binary is a pretty sizeable task (to do it correctly and completely), and it is specific to each loader (there is no generic solution). However, now that the infrastructure is in place, you might start seeing the community take a stab at it for the more popular file formats (PE, ELF). |
Will it be possible to put a header on top of a raw binary file? Use case:
firmware.bin won't work, but if you slap an ELF header on the raw instructions, they will parse. |
I have written a python script to write back small patches to a copy of the original PE/ELF binary: It's still experimental and far away from a complete export feature; but if you are only dealing with few and small modified locations it might be a good enough workaround. |
Note that the Binary export is not broken, it is simply misunderstood. This exporter simply dumps the initialized memory blocks defined within Ghidra in binary form. The blocks are appended sequentially. It was never intended to recreate a loadable/executable binary. While this is certainly a desirable feature, it does not yet exist within Ghidra. The binary exporter can provide a means of exporting a selected memory region as binary such that it can be subsequently added to another Ghidra program. This can be useful if a specific section needs to be unpacked and loaded to a specific memory address within Ghidra. |
@ghidra1 understood thanks. However this means Ghidra can’t be used to patch a binary. Which is the primary reason I use IDA. Otherwise the use is restricted to inspecting methods and watching output. |
The request is a reasonable improvement, although as an analysis tool re-writing binaries has not been a high priority. I am closing this ticket and deferring the issue to #1505 as an enhancement/improvement. |
#1505 was merged in, so there are now PE and ELF exporters that behave how you thought the Binary exporter should have behaved. No changes were made to the Binary exporter...that one still just dumps the memory image to a file as-is. The PE and ELF exporters can be used to save basic byte modifications back to a new runnable PE/ELF file. Here is the help for the PE exporter: |
Describe the bug
If you import an ELF binary with the format as
Executable and Linking Format (ELF)
and then export that binary, it creates a corrupted binary that segfaults.However, if you import it as "Raw binary" and manually select the language, then the exported file works as expected.
To Reproduce
Steps to reproduce the behavior:
cp
ELF binary into your project (default settings).Export...
Binary
as the format.Expected behavior
The exported binary should work instead of segfaulting (happens with multiple binaries that I've tested).
Screenshots


Default:
Import as Raw binary:
Environment (please complete the following information):
Additional context
Happens with both i386 and x86_64 binaries.
The text was updated successfully, but these errors were encountered: