mirror.dongdigua.github.io/org/binary_exploit.org
dongdigua bb4e2ff031 fix quote format, slightly change CSS(ol)
- collections add `wow` tag
- binary_exploit opti link
- add magical_index icon
2022-12-13 17:29:08 +08:00

1.7 KiB

Binary Exploit Resources I Recently Trying to Learn

tools

code auditing

/dongdigua/mirror.dongdigua.github.io/media/commit/cefaf85ce06e1df58a036a6a70f0a4b3d43b3719/images/fedora_security_lab.png

pscan

rats

splint

flawfinder

debug

gdb

reverse

radare2

iaito

hopper(non-free)

notes on video

0x04: asm basics

to show assembly in the source code window in gud, M-x gdb-display-disassembly-buffer

0x06: tools

simple tools

hexdump
strings

all printable letters

objdump

disassembler

strace/ltrace

trace sys/lib call

0x0A: deal with numbers

endian?

from Wikipedia https://upload.wikimedia.org/wikipedia/commons/5/54/Big-Endian.svg https://upload.wikimedia.org/wikipedia/commons/e/ed/Little-Endian.svg x86 is little endian

tools
python
  >>> int('111', 2)
  7
  >>> hex(123)
  '0x7b'
  >>> import struct
  # https://docs.python.org/3.10/library/struct.html#format-characters
  >>> struct.pack("<I", 0x61626364) # little endian
  b'dcba'
  >>> struct.pack(">I", 0x61626364) # big endian
  b'abcd'
iex
  iex(1)> <<0x61626364::32>>
  "abcd"
  iex(2)> Base.decode16("61626364")
  {:ok, "abcd"}