In the previous article we learned how to load a executable and do basic analysis in the radare2. This article is based on a picoCTF 2018 challenge "learn the gdb". If you read the article about gdb you might know it already. The file is here. Load it into the radare. r2 <filename>. Let's analyse … Continue reading Beginners guide to radare2-Part 2
Category: Reverse Enginnering
Quick intro to GDB
GDB is a short for GNU debugger. Almost all *nix OSes comes with it. So if you are playing a ctf or want to debug something quickly GDB is the way. Today we are going to learn gdb by disassembling a simple program. A picoCTF 2018 problem. File is here. We have to get the … Continue reading Quick intro to GDB
Read source files inside GDB-TUI
So when I'm debugging with GDB I'd like to see the source code and maybe interact with it. But even when I have the source file it doesn't seem to read it and get loaded. What happens is GDB is being lazy and doesn't look for the source file in the executables directory . It … Continue reading Read source files inside GDB-TUI
Dip in to ATT syntax
There are 2 syntaxes that mainly used in reverse engineering. Intel and ATT. First I thought ATT was hard to read and Intel was a clean assembly syntax. But I was wrong. ATT reduces the time and abstraction by little changes in the code that It'll be easier for humans to read. This will be … Continue reading Dip in to ATT syntax



