Beginner Issues when Debugging with gdb + gef or pwndbg, ...

preview_player
Показать описание

-=[ 📄 Info. ]=-

-=[ 🐕 Social ]=-

-=[ 📄 P.S. ]=-

#liveoverflow
Рекомендации по теме
Комментарии
Автор

Your "depth of rabbit hole" videos from the past about the topic was pretty good teasers but the problem was they lacked something fundamental in the follow through.
I gave you +100 points on the whole ASM 2 C code guiding e.t.c.

But stuff like setting breakpoints in GDB and a few other nitty gritties was not quite there, I don't fully recall the issue but i could tell you got things working, I could not tell if others where able to, based on what you where demonstrating on screen. Somethings where missing for sure in those. Like info registers.. info register nnn or x/s those kinds of things.. And how loops would reiterate so a char by char CMP operation would be important to watch for your value register at the point of CMP inside the loop....

Nah i don't remember but it was something along those lines.

Reversing and such is hard enough if the guide they follow does not compute. (that just adds to confusion) me thinks. Anyway, you ARE doing a great job!

drkwrk
Автор

@LiveUnderflow Can you please tell what intro and outro music you use? I always have to wait for a new video to listen to that song again. :( btw very nice video

maxpayne
Автор

I started in malware dev and i wanted to ask will making project not malwares help too?

Noone-rzer
Автор

hey great video! So i am a beginner and I totally relate to your discussion about 4 minutes in about AScii 0 bytes and hex bytes. oh my god i have been on this for so many months but still can't understand this . do you know a good resource?

danielgray
Автор

When do you started this reverse engineering

mohammedrifath