https://github.com/jelchison/launch-bash-without-aslr
Shell script to launch a Bash instance, from which all child processes will have ASLR disabled
https://github.com/jelchison/launch-bash-without-aslr
aslr bash bash-hacks bash-script ctf exploit-development exploit-exercises exploitation shell
Last synced: 9 months ago
JSON representation
Shell script to launch a Bash instance, from which all child processes will have ASLR disabled
- Host: GitHub
- URL: https://github.com/jelchison/launch-bash-without-aslr
- Owner: JElchison
- License: gpl-3.0
- Created: 2017-11-18T18:36:18.000Z (about 8 years ago)
- Default Branch: master
- Last Pushed: 2017-11-18T18:59:12.000Z (about 8 years ago)
- Last Synced: 2025-02-01T15:45:56.551Z (11 months ago)
- Topics: aslr, bash, bash-hacks, bash-script, ctf, exploit-development, exploit-exercises, exploitation, shell
- Language: Shell
- Size: 16.6 KB
- Stars: 3
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# launch-bash-without-aslr
Shell script to launch a Bash instance, from which all child processes will have ASLR disabled.
This script is useful for testing CTF problems in an environment without ASLR. Can also be useful for exploit development.
Runs on Linux.
## Example Usage
```
user@computer:~$ ./launch-bash-without-aslr.sh
==== ASLR disabled for this session ====
no-aslr $ echo "Look ma, no ASLR!"
Look ma, no ASLR!
no-aslr $ exit
exit
==== ASLR re-enabled ====
user@computer:~$
```
## References
* https://en.wikipedia.org/wiki/Address_space_layout_randomization
* https://linux-audit.com/linux-aslr-and-kernelrandomize_va_space-setting/
* https://stackoverflow.com/questions/11238457/disable-and-re-enable-address-space-layout-randomization-only-for-myself
* https://askubuntu.com/questions/318315/how-can-i-temporarily-disable-aslr-address-space-layout-randomization