René's URL Explorer Experiment


Title: Pasting Shellcode in GDB using Python

X Title: Pasting Shellcode in GDB using Python

X Description: A few days ago I was trying to write an exploit for a buffer overflow with GDB. This was a console application and pasting shellcode would mess with it. There are a few options: Writing shellcode to a file and then using it as input for GDB. # you can also include GDB commands like setting up breakpoints (e.g. b * 0xDEADBEEF) # remember to include a new line after each command $ python -c 'print "b * 0xDEADBEEF" + "\n" + "\x41"*1000 + "\n"' > input # $ perl -e for perl # start debugging with GDB # -q (quiet mode): no text at startup $ gdb executable1 -q (gdb) run < input After this you can manually debug in GDB.

Keywords:

Generator: Hugo 0.155.3

direct link

Domain: parsiya.net

authorParsia
twitter:cardsummary
twitter:domainparsiya.net
twitter:creator@CryptoGangsta

Links:

Hackerman's Hacking Tutorialshttps://parsiya.net/
About Me!https://parsiya.net/about/
Cheat Sheethttps://parsiya.net/cheatsheet/
My Clonehttps://parsiya.io/
Source Repohttps://github.com/parsiya/parsiya.net
Manual Work is a Bughttps://queue.acm.org/detail.cfm?id=3197520
The Other Guy from Wham!https://www.google.com/search?q=andrew+ridgeley
https://parsiya.net/index.xml
Pythonhttps://parsiya.net/categories/python/
Pythonhttps://parsiya.net/tags/python
Shellcodehttps://parsiya.net/tags/shellcode
Interactive Debugginghttps://parsiya.net/tags/interactive-debugging
Amazon S3 and CSShttps://parsiya.net/blog/2014-04-22-amazon-s3-and-css/
Piping SSL/TLS Traffic from SoapUI to Burphttps://parsiya.net/blog/2014-06-25-piping-ssl/tls-traffic-from-soapui-to-burp/
About Me!https://parsiya.net/about/
https://infosec.exchange/@parsiya
https://github.com/parsiya/
https://twitter.com/cryptogangsta/
https://www.linkedin.com/in/parsiya
Thick Client Proxyinghttps://parsiya.net/categories/thick-client-proxying/
CTFs/Writeupshttps://parsiya.net/categories/writeup/
Attack Surface Analysishttps://parsiya.net/categories/attack-surface-analysis/
Static Analysishttps://parsiya.net/categories/static-analysis/
Bug Bountyhttps://parsiya.net/categories/bug-bounty/
Blockchain (lol)https://parsiya.net/categories/blockchain/
Crypto(graphy)https://parsiya.net/categories/crypto/
Burp Extension Developmenthttps://parsiya.net/categories/burp-extension/
Automationhttps://parsiya.net/categories/automation/
Reverse Engineeringhttps://parsiya.net/categories/reverse-engineering/
WinAppDbg (use Frida instead)https://parsiya.net/categories/winappdbg/
AWSome.pw - S3 bucket squatting - my very "legit" branded vulnerabilityhttps://awsome.pw
Licensehttps://parsiya.net/license/
Hugohttps://gohugo.io
Hugo-Octopresshttps://github.com/parsiya/hugo-octopress/

Viewport: width=device-width,minimum-scale=1,maximum-scale=1


URLs of crawlers that visited me.