Description: This video is part of the SecurityTube GNU Debugger course and certification! You can start this series by watching Part 1: http://www.securitytube.net/video/5654
In this video, we will look at the NM utility and see how it can extract useful details about symbols in binaries. In course of this video, we will see how to locate symbols in the text section, initialized and uninitialized sections and many others tips and tricks!
DOWNLOAD THE PDF SLIDES AND CODE SNIPPETS OF THIS VIDEO HERE: http://www.securitytube.net/sgde?id=3
Please have a look at all the SecurityTube.net Online Courses here: http://securitytube-training.com/
Student Testimonials say it all :) http://securitytube-training.com/testimonials/
Tags: sgde , gdb , gnu debugger , securitytube ,
Vivek great videos, will it perform an attach pid as well? if i have a network connection is it possible to use gdb as a debugger for the protocol TCP/IP en search stuff inside all the OSI level layer?And will analyse .exe ?
great stuff vivek! regarding your question about nm -S. afaik if symbol is a function such as AddNumbers then nm -S returns the size of that function's binary representation in bytes.
Great stuff vivek and Great material. I just would like to know what do you mean by external and internal symbols
Thank you
Hi Vivek, first I would like to ACK you for the Gr8 Videos, these videos inspired me to re-look into GBD in greater details.
But i do face an issue from accessing your videos from part-3, the issue is im not able to hear your videos, I'mean im not able to get the sound of the videos, should i enable something to get the audio of video.
thanks in advance
Greetings Vivek, I really appreciate it :)
You asked about an address of a function as homework, I guess it's the address of thefunction beginning, Is it right?
Thanks a lot for this video.