gdb-peda
gdb-pedaの使い方
gdb-peda$ b main Breakpoint 1 at 0x80483f0 gdb-peda$ run Starting program: /home/binaryanalysis/binary_analysis/s4/stack_4-1.out [----------------------------------registers-----------------------------------] EAX: 0xf7fb6dd8 --> 0xffffd44c --> 0xffffd5f1 ("LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc"...) EBX: 0x0 ECX: 0x96edf2c3 EDX: 0xffffd3d4 --> 0x0 ESI: 0xf7fb5000 --> 0x1d7d6c EDI: 0x0 EBP: 0xffffd3a8 --> 0x0 ESP: 0xffffd3a8 --> 0x0 EIP: 0x80483f0 (<main+3>: push 0x1) EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x80483e8 <frame_dummy+40>: jmp 0x8048360 <register_tm_clones> 0x80483ed <main>: push ebp 0x80483ee <main+1>: mov ebp,esp => 0x80483f0 <main+3>: push 0x1 0x80483f2 <main+5>: push 0x2 0x80483f4 <main+7>: push 0x3 0x80483f6 <main+9>: push 0x4 0x80483f8 <main+11>: pop edx [------------------------------------stack-------------------------------------] 0000| 0xffffd3a8 --> 0x0 0004| 0xffffd3ac --> 0xf7df5e91 (<__libc_start_main+241>: add esp,0x10) 0008| 0xffffd3b0 --> 0x1 0012| 0xffffd3b4 --> 0xffffd444 --> 0xffffd5bb ("/home/binaryanalysis/binary_analysis/s4/stack_4-1.out") 0016| 0xffffd3b8 --> 0xffffd44c --> 0xffffd5f1 ("LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc"...) 0020| 0xffffd3bc --> 0xffffd3d4 --> 0x0 0024| 0xffffd3c0 --> 0x1 0028| 0xffffd3c4 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Breakpoint 1, 0x080483f0 in main () gdb-peda$ n [----------------------------------registers-----------------------------------] EAX: 0xf7fb6dd8 --> 0xffffd44c --> 0xffffd5f1 ("LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc"...) EBX: 0x0 ECX: 0x96edf2c3 EDX: 0xffffd3d4 --> 0x0 ESI: 0xf7fb5000 --> 0x1d7d6c EDI: 0x0 EBP: 0xffffd3a8 --> 0x0 ESP: 0xffffd3a4 --> 0x1 # スタックポインタが増加した EIP: 0x80483f2 (<main+5>: push 0x2) EFLAGS: 0x10246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x80483ed <main>: push ebp 0x80483ee <main+1>: mov ebp,esp 0x80483f0 <main+3>: push 0x1 => 0x80483f2 <main+5>: push 0x2 0x80483f4 <main+7>: push 0x3 0x80483f6 <main+9>: push 0x4 0x80483f8 <main+11>: pop edx 0x80483f9 <main+12>: pop edx [------------------------------------stack-------------------------------------] 0000| 0xffffd3a4 --> 0x1 # stackに1がpushされた 0004| 0xffffd3a8 --> 0x0 0008| 0xffffd3ac --> 0xf7df5e91 (<__libc_start_main+241>: add esp,0x10) 0012| 0xffffd3b0 --> 0x1 0016| 0xffffd3b4 --> 0xffffd444 --> 0xffffd5bb ("/home/binaryanalysis/binary_analysis/s4/stack_4-1.out") 0020| 0xffffd3b8 --> 0xffffd44c --> 0xffffd5f1 ("LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc"...) 0024| 0xffffd3bc --> 0xffffd3d4 --> 0x0 0028| 0xffffd3c0 --> 0x1 [------------------------------------------------------------------------------] Legend: code, data, rodata, value 0x080483f2 in main () gdb-peda$ quit