Random Note #092345: Passing binary input via GDB

randomnote gdb exploiting reverse-engineering

When trying to exploit an application it’s useful to send the input via gdb to immediately check how the input is being processed. But once the gdb is open it’s sometimes not clear how to pass binary input to applications reading from stdin, e.g. using read. An easy way is to start the debugging session with gdb ./binary and using

run < <(printf "\xAA\xAA\xAA")

from the gdb session to send arbitrary bytes.

Fuzzing A GameBoy Emulator With AFL++

fuzzing reversing exploiting

Exploiting A Use-After-Free With radare2 - CTF Challenge

ctf reversing exploiting r2 radare2 cutter heap

36C3 CTF Writeups

ctf reversing exploiting