gdb-peda

gdb-pedaの使い方

gdb-peda$ b main
Breakpoint 1 at 0x80483f0
gdb-peda$ run
Starting program: /home/binaryanalysis/binary_analysis/s4/stack_4-1.out

[----------------------------------registers-----------------------------------]
EAX: 0xf7fb6dd8 --> 0xffffd44c --> 0xffffd5f1 ("LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc"...)
EBX: 0x0
ECX: 0x96edf2c3
EDX: 0xffffd3d4 --> 0x0
ESI: 0xf7fb5000 --> 0x1d7d6c
EDI: 0x0
EBP: 0xffffd3a8 --> 0x0
ESP: 0xffffd3a8 --> 0x0
EIP: 0x80483f0 (<main+3>:       push   0x1)
EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow)
[-------------------------------------code-------------------------------------]
   0x80483e8 <frame_dummy+40>:  jmp    0x8048360 <register_tm_clones>
   0x80483ed <main>:    push   ebp
   0x80483ee <main+1>:  mov    ebp,esp
=> 0x80483f0 <main+3>:  push   0x1
   0x80483f2 <main+5>:  push   0x2
   0x80483f4 <main+7>:  push   0x3
   0x80483f6 <main+9>:  push   0x4
   0x80483f8 <main+11>: pop    edx
[------------------------------------stack-------------------------------------]
0000| 0xffffd3a8 --> 0x0
0004| 0xffffd3ac --> 0xf7df5e91 (<__libc_start_main+241>:       add    esp,0x10)
0008| 0xffffd3b0 --> 0x1
0012| 0xffffd3b4 --> 0xffffd444 --> 0xffffd5bb ("/home/binaryanalysis/binary_analysis/s4/stack_4-1.out")
0016| 0xffffd3b8 --> 0xffffd44c --> 0xffffd5f1 ("LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc"...)
0020| 0xffffd3bc --> 0xffffd3d4 --> 0x0
0024| 0xffffd3c0 --> 0x1
0028| 0xffffd3c4 --> 0x0
[------------------------------------------------------------------------------]
Legend: code, data, rodata, value

Breakpoint 1, 0x080483f0 in main ()
gdb-peda$ n

[----------------------------------registers-----------------------------------]
EAX: 0xf7fb6dd8 --> 0xffffd44c --> 0xffffd5f1 ("LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc"...)
EBX: 0x0
ECX: 0x96edf2c3
EDX: 0xffffd3d4 --> 0x0
ESI: 0xf7fb5000 --> 0x1d7d6c
EDI: 0x0
EBP: 0xffffd3a8 --> 0x0
ESP: 0xffffd3a4 --> 0x1 # スタックポインタが増加した
EIP: 0x80483f2 (<main+5>:       push   0x2)
EFLAGS: 0x10246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow)
[-------------------------------------code-------------------------------------]
   0x80483ed <main>:    push   ebp
   0x80483ee <main+1>:  mov    ebp,esp
   0x80483f0 <main+3>:  push   0x1
=> 0x80483f2 <main+5>:  push   0x2
   0x80483f4 <main+7>:  push   0x3
   0x80483f6 <main+9>:  push   0x4
   0x80483f8 <main+11>: pop    edx
   0x80483f9 <main+12>: pop    edx
[------------------------------------stack-------------------------------------]
0000| 0xffffd3a4 --> 0x1 # stackに1がpushされた
0004| 0xffffd3a8 --> 0x0
0008| 0xffffd3ac --> 0xf7df5e91 (<__libc_start_main+241>:       add    esp,0x10)
0012| 0xffffd3b0 --> 0x1
0016| 0xffffd3b4 --> 0xffffd444 --> 0xffffd5bb ("/home/binaryanalysis/binary_analysis/s4/stack_4-1.out")
0020| 0xffffd3b8 --> 0xffffd44c --> 0xffffd5f1 ("LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc"...)
0024| 0xffffd3bc --> 0xffffd3d4 --> 0x0
0028| 0xffffd3c0 --> 0x1
[------------------------------------------------------------------------------]
Legend: code, data, rodata, value
0x080483f2 in main ()
gdb-peda$ quit