sec-pentesting-toolkit/Reverse_Engineering
2014-10-10 22:22:02 -04:00
..
IntroX86 some small fixes 2014-10-07 16:06:04 -04:00
COMMAND_LINE_TOOLS.md some small fixes 2014-10-07 20:37:18 -04:00
GDB Cheat Sheet.pdf some small fixes 2014-10-07 18:30:14 -04:00
GDB_NOTES.txt some small fixes 2014-10-07 18:59:28 -04:00
README.md some small fixes 2014-10-07 18:59:28 -04:00
table.png some small fixes 2014-10-10 22:22:02 -04:00
X86_Win32_Reverse_Engineering_Cheat_Sheet.pdf some small fixes 2014-09-30 23:29:07 -04:00

Tools

Dissasembly

gdb

$ gcc -ggdb -o <filename> <filename>.c

Starting with some commands:

$ gdb <program name> -x <command file>

For example:

$ cat command.txt

set disassembly-flavor intel disas main



#### objdump 

Display information from object files:
•  Where object file can be an intermediate file
created during compilation but before linking, or a
fully linked executable

$ objdump -d


#### hexdump & xxd

For canonical hex & ASCII view:

$hexdump -C


#### xxd 
Make a hexdump or do the reverse:

xxd hello > hello.dump xxd -r hello.dump > hello