1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
| gdb-peda$ disas main
Dump of assembler code for function main:
0x000000000000072a <+0>: push rbp
0x000000000000072b <+1>: mov rbp,rsp
0x000000000000072e <+4>: sub rsp,0x20
0x0000000000000732 <+8>: mov DWORD PTR [rbp-0x18],0x17
0x0000000000000739 <+15>: mov DWORD PTR [rbp-0x14],0x1
.........................
0x00000000000007a8 <+126>: call 0x600 <printf@plt>
0x00000000000007ad <+131>: mov rax,QWORD PTR [rbp-0x10]
0x00000000000007b1 <+135>: mov rdi,rax
0x00000000000007b4 <+138>: call 0x5e0 <free@plt>
0x00000000000007b9 <+143>: mov eax,0x0
0x00000000000007be <+148>: leave
0x00000000000007bf <+149>: ret
End of assembler dump.
gdb-peda$ b * 0x0
Breakpoint 1 at 0x0
gdb-peda$ r
Starting program: /home/fumery/prog/secu/crack/a.out
Warning:
Cannot insert breakpoint 1.
Cannot access memory at address 0x0
gdb-peda$ disas main
Dump of assembler code for function main:
0x000055555555472a <+0>: push rbp
0x000055555555472b <+1>: mov rbp,rsp
0x000055555555472e <+4>: sub rsp,0x20
0x0000555555554732 <+8>: mov DWORD PTR [rbp-0x18],0x17
0x0000555555554739 <+15>: mov DWORD PTR [rbp-0x14],0x1
................................................................
0x00005555555547a8 <+126>: call 0x555555554600 <printf@plt>
0x00005555555547ad <+131>: mov rax,QWORD PTR [rbp-0x10]
0x00005555555547b1 <+135>: mov rdi,rax
0x00005555555547b4 <+138>: call 0x5555555545e0 <free@plt>
0x00005555555547b9 <+143>: mov eax,0x0
0x00005555555547be <+148>: leave
0x00005555555547bf <+149>: ret
End of assembler dump. |
Partager