🌐
RetroReversing
retroreversing.com › tutorials › gdb-reversing
Reversing with GDB (GNU Debugger) - Retro Reversing (Reverse Engineering)
Not all emulators have support for GDB out of the box, which is a shame as it is an incredibly useful feature for reverse engineering. Luckily most good emulators are open source so we can in theory add GDB support ourselves! Marcin Mikołajczyk has a good tutorial on how to add GDB support ...
🌐
CTF Handbook
ctf101.org › reverse-engineering › what-is-gdb
The GNU Debugger (GDB)
Then simply execute (gdb) delete display 1 and your execution will resume without the display.
🌐
Umd
users.umiacs.umd.edu › ~tudor › courses › ENEE757 › Fall15 › misc › gdb_tutorial.html
Using GDB for Reverse Engineering
gdb is a debugger commonly used when programming, but it is also useful for reverse engineering binary code. It lets you step through the assembly code as it runs, and examine the contents of registers and memory. You can also set breakpoints at arbitrary positions in the program.
🌐
Medium
medium.com › @rickharris_dev › reverse-engineering-using-linux-gdb-a99611ab2d32
Reverse-engineering: Using Linux GDB | by Rick Harris | Medium
May 20, 2016 - GDB, the GNU Project debugger, allows you to see what is going on `inside’ another program while it executes — or what another program was doing at the moment it crashed. When reverse engineering a program, the tool is used to review the compiled Assembly code in either the AT&T or Intel flavors to see step-by-step what is happening.
🌐
GitHub
github.com › pwndbg › pwndbg
GitHub - pwndbg/pwndbg: Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy - pwndbg/pwndbg
Starred by 9.7K users
Forked by 1.1K users
Languages   Python 97.3% | Shell 0.9% | C 0.8% | Nix 0.7% | Makefile 0.2% | Assembly 0.1%
🌐
LevelBlue
levelblue.com › blog › security essentials › reversing a binary using gdb: tutorial for reverse engineers
Reversing a binary using GDB: tutorial for Reverse Engineers
Reversing binaries is an essential skill if you want to pursue a career as exploit developer, reverse engineer or programming. The GNU Project debugger is a widely used debugger for debugging C and C++ applications on UNIX systems. A debugger is a developer's best friend to figure out software bugs and issues. This tutorial intends to be beneficial to all developers who want to create reliable and fault-free software. A debugger executes several programs and allows the programmer to manage them and analyze variables if they cause issues. GDB enables us to execute the program until it reaches a specific point.
🌐
YouTube
youtube.com › watch
GDB Tutorial for Reverse Engineers: Breakpoints, Modifying Memory and Printing its Contents - YouTube
I provide consultations regarding everything about hacking and reverse engineering! Book your timeslot: https://pathcybersec.com/consultations GDB is THE deb...
Published   March 29, 2021
Views   14K
🌐
Payatu
payatu.com › home › learning to reverse engineer with gdb
Learning to Reverse Engineer with GDB
July 24, 2024 - Let’s write a simple C program and then debug it with GDB. We can also see how reverse engineering can allow an attacker to leak/steal sensitive information from the binary.
🌐
HacksLand
hacksland.net › home › gdb reverse engineering tutorial
GDB reverse engineering tutorial
December 20, 2019 - This process is called reverse engineering. Let's run the program and figure out its functionality. user@protostar:~$ ./rev HacksLand user@protostar:~$ It just prints a string "HacksLand" and simply exits. Can you imagine what type of code this is? We can assume it might look like the following. We don't know for sure, but let's imagine: #include <stdio.h> int main(){ printf("HacksLand\n"); return 0; } Now let's start our actual reversing process. We can use GDB for this.
Find elsewhere
🌐
Habr
habr.com › en › articles › 551500
GDB Tutorial for Reverse Engineers: Breakpoints, Modifying Memory and Printing its Contents / Habr
April 8, 2021 - But what’s important to understand about GDB is that GDB is not simply a tool, it’s a debugging framework for you to build upon. In this video, I’m gonna walk you through GDB setup for reverse engineering and show you all of the necessary commands and shortcuts for your debugging workflow.
🌐
Checkmate
niiconsulting.com › checkmate › 2018 › 04 › reverse-engineering-x64-for-beginners-linux
Reverse Engineering x64 for Beginners – Linux Network
July 30, 2025 - We will execute the binary with GDB and we will first setup a breakpoint on main before we send the argument. Secondly, we will enable time travelling on our GDB, so that if we somehow go one step ahead by mistake, we can reverse that and come ...
🌐
Debasish
debasish.in › 2012 › 01 › reversing-simple-program-with-gdb.html
Basic Reverse Engineering with GDB
June 13, 2013 - "Basic Reverse Engineering with GDB" offers a concise introduction to using GDB (GNU Debugger) for reverse engineering purposes. It provides practical insights into analyzing and understanding software binaries by utilizing GDB's debugging ...
🌐
Medium
medium.com › @securosoft › basic-reverse-engineering-using-gdb-ebfb0afca8f4
Basic Reverse Engineering using GDB | by SecuroSoft | Medium
January 18, 2022 - Reverse Engineering and Malware Analysis are now becoming fields of growing research. Here’s a jump start for all of you interested in Reverse Engineering. I’ll be using the GNU Debugger (GDB) for this tutorial.
🌐
Jayconrod
jayconrod.com › posts › 28 › tutorial-reverse-debugging-with-gdb-7
Tutorial: Reverse debugging with GDB 7 — jayconrod.com
The only memory operation here ... changed its value. We can find out where it was changed by setting a watchpoint and using the reverse-continue command....
🌐
Brundle's Laboratory
brundlelab.wordpress.com › 2010 › 06 › 21 › playing-with-gdb-reverse-engineer-your-way
Playing with gdb. Reverse engineer your way. – Brundle's Laboratory
June 21, 2010 - Pingback: gdb turns off ASLR « codeblog | how to cook · Very nice article thank you very much i have so fun while reading your blog posts. :) ... That was a great tutorial! I used this when playing some wargames the other day (really challenging!), so thanks! Another tutorial that I found helpful was from this site: http://technology-flow.com/tutorials/reverse-engineering...
🌐
LSE Blog
blog.lse.epita.fr › 2012 › 05 › 01 › pythongdb-tutorial-for-reverse-engineering-part.html
PythonGDB tutorial for reverse engineering - part 1 | LSE Blog
May 1, 2012 - (gdb) r "Test %x" Starting program: /home/delroth/test/fstring/a.out "Test %x" Format string in writable memory! Breakpoint -1, 0x00007ffff7a88b00 in printf () from /lib/libc.so.6 (gdb) bt #0 0x00007ffff7a88b00 in printf () from /lib/libc.so.6 #1 0x0000000000400503 in main () This ends the first part of my PythonGDB for reverse engineering tutorial.
🌐
Shantanugoel
shantanugoel.com › 2017 › 11 › 16 › practical-reverse-engineering-tutorial-1
Practical Reverse Engineering Tutorials Part 1: Introduction & Protostar Stack 0 :: Shantanu Vs The World
Now that we know what we need to achieve, we start our reverse engineering by doing static analysis of the program. There are several utilities to look at the low level code of the program. However, we will be using gdb here which can help us later in dynamic analysis as well.
🌐
Reverse Engineering
0xinfection.github.io › reversing › pages › part-15-debugging-hello-world.html
Part 15 - Debugging Hello World · Reverse Engineering
For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/Reverse-Engineering-Tutorial · Let’s review our code from last week. Let’s debug! Let’s fire up GDB which is the GNU Debugger to which we will break down the C++ binary and step through it line-by-line in ARM Assembly.
🌐
Cyber Wired
cyberwiredtraining.net › blog › gdb-for-reverse-engineering-in-ctfs
GDB for Reverse Engineering — Cyber Wired
November 6, 2024 - The GNU Debugger (GDB) is a powerful ... of ELF binaries. This post will walk you through gathering an understanding of the basic usage of this command line utility for debugging to build familiarity with GDB....