A typical error in gdb with setting breakpoints when dealing with binaries affected by ASLR is: "Cannot access memory at address 0x807". This can be quite frustrating at the beginning, especially if you don't know much about PIE yet. In this video I want to cover a few different ways how you can still debug them with gdb and Ghidra.
-=[ 🔴 Stuff I use ]=-
→ Microphone:* → Graphics tablet:* → Camera#1 for streaming:* → Lens for streaming:* → Connect Camera#1 to PC:* → Camera#2 for electronics:* → Lens for macro shots:* → Keyboard:* → Headphones:*
-=[ ❤️ Support ]=-
→ per Video: → per Month:
-=[ 🐕 Social ]=-
→ Twitter: → Website: → Subreddit: → Facebook:
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Live Overflow,liveoverflow,hacking tutorial,how to hack,exploit tutorial,gdb,debugging,binaries,debugger,ghidra,reverse engineering,cannot access memory,insert breakpoint,PIE,position independent,executable,code,position-independent,ASLR,address-space,layour randomization,randomisation,break,binary exploitation,buffer overflows,set breakpoints,
0 Comments