From 1fe673ce5dcafb6d7bd7421a2939c92c254ebd04 Mon Sep 17 00:00:00 2001 From: Eli McRae Date: Sat, 2 Sep 2023 03:59:17 -0500 Subject: [PATCH] Update ld.so.md Co-authored-by: Andrea Cardaci --- _gtfobins/ld.so.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/_gtfobins/ld.so.md b/_gtfobins/ld.so.md index c251e78..e5b8900 100644 --- a/_gtfobins/ld.so.md +++ b/_gtfobins/ld.so.md @@ -6,6 +6,8 @@ description: | $ strings /proc/self/exe | head -1 /lib64/ld-linux-x86-64.so.2 ``` + + It's worth noting that the spawned process will be the loader, not the target executable, this might aid evasion. See https://shyft.us/posts/20230526_linux_command_proxy.html for more information. functions: shell: - code: /lib/ld.so /bin/sh