GDB Tutorial for Reverse Engineers: Breakpoints, Modifying Memory and Printing its Contents

preview_player
Показать описание


GDB is THE debugger for reverse engineering Linux programs. But it can be quite hard to grasp. Also, GDB is better with plugins. In this tutorial, I'll show you GDB as well as PEDA basics for reverse engineering: starting program, breakpoints, modifying registers and memory, and printing memory contents.

Happy hacking!

Table of Contents
0:00 Intro
0:42 Installing GDB and PEDA
1:12 Our Debugging Target
1:53 Loading a File in GDB
2:22 Breakpoints
3:21 Single-stepping
4:19 Modifying Registers
6:06 Modifying Memory
7:34 Examining Memory
8:38 Final Thoughts
9:24 Outtakes

Рекомендации по теме
Комментарии
Автор

This video is so relaxing to watch! Great content.

rootshell
Автор

Really nice tutorial. I was struggling with gdb until you introduced peda. Thanks so much!

shivkarj
Автор

You're putting up some great content ! Waiting for the next videos ! :))

grisa
Автор

nice gogogogo teach me everything u knowww

seewhatseeabc
Автор

sir how to crack online login software ?

gous
Автор

achei voce chomps melhore seu ingles fofo

guilhermemelo
Автор

Может стоит на русском говорить, а субтитры написать на английском?

andrewclark
Автор

Had to stop watching because of the music. Just leave it out, it adds nothing, it's distracting, and unless you're trying to make a channel about music videos, it's completely detrimental to the content you seem to want to be making.

Meton