Random Note #092345: Passing binary input via GDB

October 26, 2018
randomnote gdb exploiting reverse-engineering

When trying to exploit an application it’s useful to send the input via gdb to immediately check how the input is being processed. But once the gdb is open it’s sometimes not clear how to pass binary input to applications reading from stdin, e.g. using read. An easy way is to start the debugging session with gdb ./binary and using

run < <(printf "\xAA\xAA\xAA")

from the gdb session to send arbitrary bytes.

In-Process Fuzzing With Frida

October 24, 2019
frida exploiting fuzzing reverse-engineering

Dynamic Instrumentation: Frida And r2frida For Noobs

September 13, 2019
radare2 r2 frida r2frida ctf reverse-engineering

r2con 2019 CTF Writeups

September 2, 2019
r2 radare2 ctf reverse-engineering