Skip to content

Memory Analysis and File Permissions

Conducting memory analysis and ensuring appropriate file permissions are critical aspects of assessing application security. Let's delve into these aspects:

1. Memory Analysis

Sensitive Information Detection

  • Tools like strings or flarefoss: Utilize tools such as strings or flarefoss to check if sensitive information is written into memory. These tools can help identify plaintext passwords, API keys, or other sensitive data stored in memory.

Log File Inspection

  • Log File Content: Before and after testing the application, redirect its output to a log file (logs.txt) using the command example.exe > logs.txt. Afterwards, inspect the log file for any sensitive information written during the application's execution, which could potentially be exploited by attackers.

2. File Permissions

Security of Installed Files

  • File Manipulation Permissions: Ensure that files created during installation have appropriate permissions set to prevent unauthorized modification. These files should typically not have write permissions to prevent tampering by attackers or malicious applications.

Application Data Files

  • Data File Permissions: Files storing application-related information should have restricted permissions to prevent unauthorized access or modification. This mitigates the risk of attackers tampering with critical application data or interfering with the file system of other applications.

3. Protection Against Flooding Attacks

Input Handling

  • Input Validation: Assess whether the application handles input appropriately to mitigate flooding attacks. Proper input validation helps prevent memory corruption, buffer overflow, and other vulnerabilities that can arise from processing large volumes of data.

Reference