Donnerstag, 8. Januar 2009

STUFF

objdump -D -b -m i386 egg_1 > egg_1.asm

((void(*)())buf)(); execute buf, cast to function

p $ebp+4 # show the address
x $ebp+4 # show the content

disas 0x00c42d00

unlimit -c unlimited -> on segmentation fault will get a coredump
-> gdb -c core*

ald: assembly language debugger

ald: attach pid
load prog
d, b 0xbf...
n e -n 280 0xBF
d -n 22 0x...



Keine Kommentare:

Kommentar veröffentlichen