🌐
RetroReversing
retroreversing.com › tutorials › gdb-reversing
Reversing with GDB (GNU Debugger) - Retro Reversing (Reverse Engineering)
August 28, 2020 - Not all emulators have support for GDB out of the box, which is a shame as it is an incredibly useful feature for reverse engineering. Luckily most good emulators are open source so we can in theory add GDB support ourselves! Marcin Mikołajczyk has a good tutorial on how to add GDB support ...
🌐
CTF Handbook
ctf101.org › reverse-engineering › what-is-gdb
The GNU Debugger (GDB)
Then simply execute (gdb) delete display 1 and your execution will resume without the display.
Discussions

disassembly - Books on reversing with GDB? - Reverse Engineering Stack Exchange
I'm getting started with some reverse engineering lately, especially on Linux and ELF format, but I'm struggling here. For now I'm only using GDB to disassemble binaries, and even though I can r... More on reverseengineering.stackexchange.com
🌐 reverseengineering.stackexchange.com
June 23, 2015
How to use gdb to reverse engineer an ELF which runs another program? - Stack Overflow
You can set a breakpoint and then gdb will stop and you can step or whatever from that point. 2012-11-29T03:51:14.95Z+00:00 ... So if there is no symbol table, we generally cannot RE an ELF, right? 2012-11-29T03:55:00.213Z+00:00 ... That's not true at all. In general, the reason you might want to reverse engineer ... More on stackoverflow.com
🌐 stackoverflow.com
Anyone doing Reverse-engineering ? What tools do you use ?

Used to do some on Windows with Olly and IDA. Mostly I'm just glad I don't often have to bother myself with it.

More on reddit.com
🌐 r/thinkpad
47
372
January 1, 2020
Reverse engineering homelab, GDB and multiple architectures?
Have you seen Attify OS ? https://blog.attify.com/getting-started-with-firmware-emulation/ I realise now this doesn't specifically answer your question, but I'll leave it here as it's interesting for emulating different architectures More on reddit.com
🌐 r/AskNetsec
4
17
November 26, 2022
🌐
Umd
users.umiacs.umd.edu › ~tudor › courses › ENEE757 › Fall15 › misc › gdb_tutorial.html
Using GDB for Reverse Engineering
gdb is a debugger commonly used when programming, but it is also useful for reverse engineering binary code. It lets you step through the assembly code as it runs, and examine the contents of registers and memory. You can also set breakpoints at arbitrary positions in the program.
🌐
Medium
medium.com › @rickharris_dev › reverse-engineering-using-linux-gdb-a99611ab2d32
Reverse-engineering: Using Linux GDB | by Rick Harris | Medium
May 20, 2016 - GDB, the GNU Project debugger, allows you to see what is going on `inside’ another program while it executes — or what another program was doing at the moment it crashed. When reverse engineering a program, the tool is used to review the compiled Assembly code in either the AT&T or Intel flavors to see step-by-step what is happening.
🌐
Medium
slava-moskvin.medium.com › gdb-tutorial-for-reverse-engineers-breakpoints-modifying-memory-and-printing-its-contents-46280ac37aad
GDB Tutorial for Reverse Engineers: Breakpoints, Modifying Memory and Printing its Contents | by Path Cybersec [Slava Moskvin] | Medium
April 8, 2021 - GDB Tutorial for Reverse Engineers: Breakpoints, Modifying Memory and Printing its Contents GDB is THE debugger for Linux programs. It’s super powerful. But its user-friendliness or lack thereof …
🌐
AT&T
cybersecurity.att.com › levelblue › blog › security essentials › reversing a binary using gdb: tutorial for reverse engineers
Reversing a binary using GDB: tutorial for Reverse Engineers | LevelBlue
November 3, 2021 - Reversing binaries is an essential skill if you want to pursue a career as exploit developer, reverse engineer or programming. The GNU Project debugger is a widely used debugger for debugging C and C++ applications on UNIX systems. A debugger is a developer's best friend to figure out software bugs and issues. This tutorial intends to be beneficial to all developers who want to create reliable and fault-free software. A debugger executes several programs and allows the programmer to manage them and analyze variables if they cause issues. GDB enables us to execute the program until it reaches a specific point.
🌐
GitHub
github.com › pwndbg › pwndbg
GitHub - pwndbg/pwndbg: Exploit Development and Reverse Engineering with GDB & LLDB Made Easy · GitHub
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy - pwndbg/pwndbg
Starred by 10.2K users
Forked by 1.2K users
Languages   Python 97.2% | Shell 0.9% | C 0.8% | Nix 0.7% | Makefile 0.3% | Assembly 0.1%
🌐
YouTube
youtube.com › watch
GDB Tutorial for Reverse Engineers: Breakpoints, Modifying Memory and Printing its Contents - YouTube
I provide consultations regarding everything about hacking and reverse engineering! Book your timeslot: https://pathcybersec.com/consultations GDB is THE deb...
Published   March 29, 2021
Views   14K
Find elsewhere
🌐
Payatu
payatu.com › home › learning to reverse engineer with gdb
Learning to Reverse Engineer with GDB
July 24, 2024 - Let’s write a simple C program and then debug it with GDB. We can also see how reverse engineering can allow an attacker to leak/steal sensitive information from the binary.
🌐
LevelBlue
levelblue.com › blogs › security-essentials › reversing-a-binary-using-gdb-tutorial-for-reverse-engineers
Reversing a binary using GDB: tutorial for Reverse Engineers
November 3, 2021 - Reversing binaries is an essential skill if you want to pursue a career as exploit developer, reverse engineer or programming. The GNU Project debugger is a widely used debugger for debugging C and C++ applications on UNIX systems. A debugger is a developer's best friend to figure out software bugs and issues. This tutorial intends to be beneficial to all developers who want to create reliable and fault-free software. A debugger executes several programs and allows the programmer to manage them and analyze variables if they cause issues. GDB enables us to execute the program until it reaches a specific point.
🌐
HacksLand
hacksland.net › home › gdb reverse engineering tutorial
GDB reverse engineering tutorial
December 20, 2019 - This process is called reverse engineering. Let's run the program and figure out its functionality. user@protostar:~$ ./rev HacksLand user@protostar:~$ It just prints a string "HacksLand" and simply exits. Can you imagine what type of code this is? We can assume it might look like the following. We don't know for sure, but let's imagine: #include <stdio.h> int main(){ printf("HacksLand\n"); return 0; } Now let's start our actual reversing process. We can use GDB for this.
🌐
Debasish
debasish.in › 2012 › 01 › reversing-simple-program-with-gdb.html
Basic Reverse Engineering with GDB
June 13, 2013 - "Basic Reverse Engineering with GDB" offers a concise introduction to using GDB (GNU Debugger) for reverse engineering purposes. It provides practical insights into analyzing and understanding software binaries by utilizing GDB's debugging ...
🌐
Medium
medium.com › @securosoft › basic-reverse-engineering-using-gdb-ebfb0afca8f4
Basic Reverse Engineering using GDB | by SecuroSoft | Medium
January 18, 2022 - Reverse Engineering and Malware Analysis are now becoming fields of growing research. Here’s a jump start for all of you interested in Reverse Engineering. I’ll be using the GNU Debugger (GDB) for this tutorial.
🌐
Habr
habr.com › en › post › 551500
GDB Tutorial for Reverse Engineers: Breakpoints, Modifying Memory and Printing its Contents / Habr
August 4, 2021 - But what’s important to understand about GDB is that GDB is not simply a tool, it’s a debugging framework for you to build upon. In this video, I’m gonna walk you through GDB setup for reverse engineering and show you all of the necessary commands and shortcuts for your debugging workflow.
🌐
Brundle's Laboratory
brundlelab.wordpress.com › 2010 › 06 › 21 › playing-with-gdb-reverse-engineer-your-way
Playing with gdb. Reverse engineer your way. – Brundle's Laboratory
June 21, 2010 - Pingback: gdb turns off ASLR « codeblog | how to cook · Very nice article thank you very much i have so fun while reading your blog posts. :) ... That was a great tutorial! I used this when playing some wargames the other day (really challenging!), so thanks! Another tutorial that I found helpful was from this site: http://technology-flow.com/tutorials/reverse-engineering...
🌐
Cyber Wired
cyberwiredtraining.net › blog › gdb-for-reverse-engineering-in-ctfs
GDB for Reverse Engineering — Cyber Wired
November 6, 2024 - The GNU Debugger (GDB) is a powerful ... of ELF binaries. This post will walk you through gathering an understanding of the basic usage of this command line utility for debugging to build familiarity with GDB....
🌐
YouTube
youtube.com › watch
HOW TO: Tutorial (a) Use GNU GDB for reverse debugging - YouTube
Use GNU GDB for reverse debuggingFind more resources at: https://www.mvista.com
Published   February 3, 2022