Intro to Debugging w/ GDB (PicoCTF 2022 #11 'gdb-test-drive')
Вставка
- Опубліковано 30 чер 2024
- Help the channel grow with a Like, Comment, & Subscribe!
❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
Check out the affiliates below for more free or discounted learning!
🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
👨🏻💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
📗Humble Bundle ➡ j-h.io/humblebundle
🐶Snyk ➡ j-h.io/snyk
🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
🚩 CTF Hosting Requests ➡ j-h.io/ctf
🎤 Speaking Requests ➡ j-h.io/speaking
💥 Malware Submission ➡ j-h.io/malware
❓ Everything Else ➡ j-h.io/etc
Amazing video, realy appreciate the pico series!!!
I wish i understood more about gdp , this is a great start
absolutely loved it :)
that jump is so powerful 🌩 thanks for showing that.
Thank you! Very interesting!
Thanks! :)
I wonder if we can use gdb for other CTF's you are doing to simply jump to where the flag prints, or decrypts it.
The one I vaguely remember atm is a CTF that had a rock paper scissors game and was checking the input string to see if the user won against the computer or not. Instead of winning against it, could you use this gdb to simply jump to the stdout flag function call?
Seems like this could be abused for many CTF's as it would simply bypass anything trying to defend against it
thank you for help
very informative, thanks Bud, can you please explain how immunity debugger. I am taking my PTP and kinda lost with the assembly and how it works when preforming buffer overflow.
Thanks
Thank's :)
I've tried using gdb for some small program that opens browser in headfull mode and scrapes some staff, but I can't get it to work properly. I think that my type of program is one of the hardest to debug, because sometimes browser do weird things, at least IMO. I would love to see a video when you debug some code that interacts with a browser
"Did it restart the network manager" John thinking he got pwned by downloading wrong and bad package 🤣
If they didn't tell us where to put the breakpoint or where to jump, how would you approach this problem?
my gdb goes directly to gef how to prevent that anyone ?
Whats the difference between ghidra and gdb ?
gdb has no gui, we cannot recompile into binary after patch a bug.
UA-cam algorithm things
that number I posted wants it so much move it to that you are not asking for them male identity for my identity