Skip to main content

Inject code into a running Python process

Project description

Injects code into a running Python process.

Requirements

Download

Download the latest stable release from PyPi: http://pypi.python.org/pypi/pyrasite

easy_install pyrasite

Grab the latest source by running:

git clone git://git.fedorahosted.org/git/pyrasite

You can also fork pyrasite on GitHub: http://github.com/lmacken/pyrasite

API

This pyrasite unit test injects a print(“Hello World!”) payload into a process and ensures it gets printed.

from pyrasite.inject import CodeInjector

def test_injection(self):
    cmd = 'python -c "import time; time.sleep(0.5)"'
    p = subprocess.Popen(cmd, shell=True, stdout=subprocess.PIPE)

    ci = CodeInjector(p.pid, 'payloads/helloworld.py')
    ci.inject()

    stdout, stderr = p.communicate()
    assert 'Hello World!' in stdout, "Code injection failed"

Payloads

Reverse Python Shell

This lets you easily introspect or alter any objects in your running process.

$ python
>>> x = 'foo'
$ pyrasite <PID> payloads/reverse_python_shell.py
$ nc -l localhost 9001
Python 2.7.1 (r271:86832, Apr 12 2011, 16:15:16)
[GCC 4.6.0 20110331 (Red Hat 4.6.0-2)]
Type 'quit' to exit.
>>> print x
foo
>>> globals()['x'] = 'bar'

Viewing the largest objects in your process

This payload uses meliae to dump all of the objects in your process to an objects.json file (currently dumped in the working directory of your process).

$ pyrasite <PID> payloads/dump_memory.py

Pyrasite also provides a tool to view the values of largest objects in your process.

$ pyrasite-memory-viewer <PID> objects.json
http://lewk.org/img/pyrasite-memory-viewer.png

Reverse Shell

$ pyrasite <PID> payloads/reverse_shell.py
$ nc -l localhost 9001
Linux tomservo 2.6.40.3-0.fc15.x86_64 #1 SMP Tue Aug 16 04:10:59 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux
Type 'quit' to exit.
% ls

Call Graph

Pyrasite comes with a payload that generates an image of your processes call graph using pycallgraph.

$ pyrasite <PID> payloads/start_callgraph.py
$ pyrasite <PID> payloads/stop_callgraph.py

The callgraph is then generated using graphviz and saved to callgraph.png. You can see an example callgraph here.

Dumping modules, thread stacks, and forcing garbage collection

payloads/dump_modules.py
payloads/dump_stacks.py
payloads/force_garbage_collection.py

Additional installation notes

Mac OS X

If you don’t want to override Apple’s default gdb, install the latest version of gdb with a prefix (e.g. gnu)

$ ./configure --program-prefix=gnu
$ pyrasite <PID> payloads/reverse_python_shell.py --prefix="gnu"

Ubuntu

Since version 10.10, Ubuntu ships with a controversial patch that restricts the scope of ptrace, which can be disabled by running:

echo 0 > /proc/sys/kernel/yama/ptrace_scope

Mailing List

https://fedorahosted.org/mailman/listinfo/pyrasite

Authors

Luke Macken <lmacken@redhat.com>

David Malcolm <dmalcolm@redhat.com>

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pyrasite-1.1.tar.gz (30.1 kB view details)

Uploaded Source

File details

Details for the file pyrasite-1.1.tar.gz.

File metadata

  • Download URL: pyrasite-1.1.tar.gz
  • Upload date:
  • Size: 30.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for pyrasite-1.1.tar.gz
Algorithm Hash digest
SHA256 b8b8e79c2a5e8974e010e97a269b9fe147e321230818d7e9c92d13dd69f0c904
MD5 31266f9d9a098e8d550cf672c43d4ae2
BLAKE2b-256 248b00cff2426e683969c913fe3dd8faf7a253ea943c15e6e851b842ef8ddb24

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page