Re: Execute binary code

2007-01-11 Thread Jorgen Grahn
On Wed, 10 Jan 2007 10:31:50 -0600, Chris Mellon <[EMAIL PROTECTED]> wrote: > On 10 Jan 2007 08:12:41 -0800, sturlamolden <[EMAIL PROTECTED]> wrote: >> >> Chris Mellon wrote: >> >> > This works fine if the binary data is "pure" asm, but the impresssion >> > the OP gave is that it's a compiled binar

Re: Execute binary code

2007-01-11 Thread Jorgen Grahn
On 9 Jan 2007 07:04:11 -0800, sturlamolden <[EMAIL PROTECTED]> wrote: > > Jorgen Grahn wrote: > >> For what it's worth[1], under Unix it /is/ impossible. The only way to bring >> in >> new code (short of dynamic libraries) is to call exec(2) or its variations, >> and all need a file system object

Re: Execute binary code

2007-01-10 Thread Chris Mellon
On 10 Jan 2007 08:12:41 -0800, sturlamolden <[EMAIL PROTECTED]> wrote: > > Chris Mellon wrote: > > > This works fine if the binary data is "pure" asm, but the impresssion > > the OP gave is that it's a compiled binary, which you can't just "jump > > into" this way. > > You may have to offset the fu

Re: Execute binary code

2007-01-10 Thread sturlamolden
Chris Mellon wrote: > This works fine if the binary data is "pure" asm, but the impresssion > the OP gave is that it's a compiled binary, which you can't just "jump > into" this way. You may have to offset the function pointer so the entry point becomes correct. -- http://mail.python.org/mailm

Re: Execute binary code

2007-01-09 Thread Chris Mellon
On 9 Jan 2007 07:04:11 -0800, sturlamolden <[EMAIL PROTECTED]> wrote: > > Jorgen Grahn wrote: > > > For what it's worth[1], under Unix it /is/ impossible. The only way to > > bring in > > new code (short of dynamic libraries) is to call exec(2) or its variations, > > and all need a file system obj

Re: Execute binary code

2007-01-09 Thread sturlamolden
Jorgen Grahn wrote: > For what it's worth[1], under Unix it /is/ impossible. The only way to bring > in > new code (short of dynamic libraries) is to call exec(2) or its variations, > and all need a file system object to load the code from. The x86 processor cannot tell the difference between c

Re: Execute binary code

2007-01-09 Thread [EMAIL PROTECTED]
Jorgen Grahn wrote: > On 8 Jan 2007 12:29:36 -0800, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > For what it's worth[1], under Unix it /is/ impossible. The only way to bring > in > new code (short of dynamic libraries) is to call exec(2) or its variations, > and all need a file system object t

Re: Execute binary code

2007-01-09 Thread Jorgen Grahn
On 8 Jan 2007 12:29:36 -0800, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > > [EMAIL PROTECTED] wrote: >> Is it possible to execute a binary string stored within a python script >> as executable code ? >> >> The script is run under Windows, and the binary code (a full executable >> file) is stored

Re: Execute binary code

2007-01-09 Thread Hendrik van Rooyen
"Chris Mellon" <[EMAIL PROTECTED]> wrote: > Repost. Is there any chance at all that ML could set the > reply-to to the list instead of the sender? +1 - I regularly hit "reply all", delete the OP, and then I get : "Message has a suspicious header" - Hendrik -- http://mail.python.org/mai

Re: Fwd: Execute binary code

2007-01-08 Thread Chris Mellon
On 1/8/07, Gabriel Genellina <[EMAIL PROTECTED]> wrote: > At Monday 8/1/2007 18:01, [EMAIL PROTECTED] wrote: > > >Chris Mellon wrote: > > > Writing to a temp file will be at least 3 times as easy and twice as > > > reliable as any other method you come up with. > > > >I'm not disputing that, but I

Re: Fwd: Execute binary code

2007-01-08 Thread Gabriel Genellina
At Monday 8/1/2007 18:01, [EMAIL PROTECTED] wrote: Chris Mellon wrote: > Writing to a temp file will be at least 3 times as easy and twice as > reliable as any other method you come up with. I'm not disputing that, but I want to keep a piece of code (a parser for Oracle binary dumps, that I did

Re: Execute binary code

2007-01-08 Thread Bjoern Schliessmann
[EMAIL PROTECTED] wrote: > The code I try to execute is Windows specific and it is binary, > not python. Furthermore, it is stored in a variable within the > parent python script, not stored on harddisk as a file. Sure, I just wanted to show that your special application is not specific for troja

Re: Execute binary code

2007-01-08 Thread citronelu
Bjoern Schliessmann wrote: > But you could technically achieve this with standard python too > (just write python source and spawn a python process executing it). The code I try to execute is Windows specific and it is binary, not python. Furthermore, it is stored in a variable within the parent

Re: Execute binary code

2007-01-08 Thread Bjoern Schliessmann
Larry Bates wrote: > What you are asking is a virus/trojan "like" program. Why? For being a trojan horse it must fake something. For being a virus it must replicate itself. Writing an executable doesn't imply the will to replicate itself. But you could technically achieve this with standard pyt

Re: Fwd: Execute binary code

2007-01-08 Thread citronelu
Chris Mellon wrote: > Writing to a temp file will be at least 3 times as easy and twice as > reliable as any other method you come up with. I'm not disputing that, but I want to keep a piece of code (a parser for Oracle binary dumps, that I didn't wrote) out of foreign hands, as much as possible.

Fwd: Execute binary code

2007-01-08 Thread Chris Mellon
On 8 Jan 2007 12:45:45 -0800, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > Larry Bates wrote: > > > What you are asking is a virus/trojan "like" program. There's no reason > > you shouldn't be able to write the code to TEMP directory and execute it. > > > > -Larry > > > No, it is not about a tro

Re: Execute binary code

2007-01-08 Thread citronelu
Larry Bates wrote: > What you are asking is a virus/trojan "like" program. There's no reason > you shouldn't be able to write the code to TEMP directory and execute it. > > -Larry No, it is not about a trojan, but I guess it's pointless to try to convince you otherwise. It's not about being ab

Re: Execute binary code

2007-01-08 Thread olsongt
[EMAIL PROTECTED] wrote: > Is it possible to execute a binary string stored within a python script > as executable code ? > > The script is run under Windows, and the binary code (a full executable > file) is stored in a variable in the script. > > I know I can use os.system() or os.popen() to run

Re: Execute binary code

2007-01-08 Thread Larry Bates
[EMAIL PROTECTED] wrote: > Is it possible to execute a binary string stored within a python script > as executable code ? > > The script is run under Windows, and the binary code (a full executable > file) is stored in a variable in the script. > > I know I can use os.system() or os.popen() to ru

Execute binary code

2007-01-08 Thread citronelu
Is it possible to execute a binary string stored within a python script as executable code ? The script is run under Windows, and the binary code (a full executable file) is stored in a variable in the script. I know I can use os.system() or os.popen() to run an external file, but these functions