FunWithElectronics.com
          - Collection of Information for those with Electronics as a Hobby
Up one level (Linux command line)

ELF debugging and manipulation





objdump -s my_program    # See all the sections in binary format
readelf -a my_program    # Show all kinds of information about an ELF
objcopy -O binary my_program  my_program.bin   # Gets the flat binary for an ELF

setarch `uname -m` -R ./my_program   # Run with ASLR off
echo 2 | sudo tee /proc/sys/kernel/randomize_va_space    # Turn off ASLR globally temporarily

pmap   # see memory mapping

objdump -b binary --adjust-vma=0x0 -m i386:x86-64 -D pure_binary_executable


objdump -b binary --adjust-vma=0x0 -mi386 -Maddr16,data16 -D for32.bin   # works with bootloaders
# or equivalently
objdump -b binary --adjust-vma=0x0 -mi8086 -D for32.bin


In gdb:
 set disable-randomization off



Add a comment:

Fill in number
Name:
Title:
Text:
 


Privacy | Contact