Reversing with GDB null Mumbai Public Puliya 19 January 2019 Reversing with GDB
Abstract
This session would cover the basics of GDB and how you can use it as your first step towards reverse engineering and then later identifying a vulnerability which you might want to exploit. This session would act as a follow up session to my previous talk on Return Oriented Programming in Bangalore. This session would also cover using other tools for reverse engineering like ltrace, strace, objdump and how to employ these tools in identifying overflow attacks or return based attacks(jump attacks).
We will be using gdb for following jobs -
Runtime analysis
Manipulating program flows
Disassembly
Reverse engineeringKnowledge-wise, the only preprequisite that you might require is basic understanding of the C code. Other software prerequisites for this session would be released soon
Speaker
Timing
Starts at Saturday January 19 2019, 10:10 AM. The sessions runs for about 4 hours.