feat(events): add stack_pivot event #4403
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Closes #4404
1. Explain what the PR does
Add
stack_pivot
event, which detects usage of the stack pivoting technique as part of a ROP exploit, by monitoring selected syscalls and verifying the location of the stack pointer.2. Explain how to test it
Run tracee as follows:
Compile and run the tester program:
After 15 seconds a stack pivot event should be triggered.
3. Other comments
Like
suspicious_syscall_source
, this event makes use of event parameters to determine which syscalls should be monitored. The new probe group created forsuspicious_syscall_source
was made generic for "syscall checker" events, and each time a probe is triggered only the "checkers" which selected that syscall are run.