Title: Pasting Shellcode in GDB using Python
X Title: Pasting Shellcode in GDB using Python
X Description: A few days ago I was trying to write an exploit for a buffer overflow with GDB. This was a console application and pasting shellcode would mess with it. There are a few options: Writing shellcode to a file and then using it as input for GDB. # you can also include GDB commands like setting up breakpoints (e.g. b * 0xDEADBEEF) # remember to include a new line after each command $ python -c 'print "b * 0xDEADBEEF" + "\n" + "\x41"*1000 + "\n"' > input # $ perl -e for perl # start debugging with GDB # -q (quiet mode): no text at startup $ gdb executable1 -q (gdb) run < input After this you can manually debug in GDB.
Keywords:
Generator: Hugo 0.155.3
Domain: parsiya.net
| author | Parsia |
| twitter:card | summary |
| twitter:domain | parsiya.net |
| twitter:creator | @CryptoGangsta |
Links:
Viewport: width=device-width,minimum-scale=1,maximum-scale=1