A small project of hooking the execve()
syscall, to randomly sabotage typed bash commands.
This project was tested on 5.11.0-38-generic
.
Before building the project, make sure to update the sys_call_table
address in hooks.c with the value of following command
$ sudo cat /proc/kallsyms | grep ' sys_call_table$'
To build and load simply execute
$ make && sudo insmod sabotage.ko