CS208, Friday 4 Feb 2022
What are we ready for?
- Reverse engineering
- Security attacks (especially buffer overflow) (we'll look at recent news)
- Virtual memory
- Threads and processes
- Network programming
Environment variables
- Unix commands: echo, env
- C support: third parameter to main
- C support: getenv and secure_getenv
gdb: the GNU debugger
- GNU = GNU's Not UNIX
- gcc -Wall -Werror -g -O0 -o whatever whatever.c
- gdb commands (see this gdb mini-lab for a quick run-through)
- run [args]
- continue
- break [filename:]linenum
- list [startline,endline]
- print variable-name
- info reg [regname]
- backtrace (bt)
- next
- step
- x/60w address