Hello, I am at the “Attacking Applications Connecting to Services” section on the Attacking Common Applications Module. In this section they tell you to use gdb to examinate an elf file and put a breakpoint at a specific address, my concern is why does the address shown at the module have a different format than the one that i get. Furthermore, using the address that i get doesn’t work but using the one on the module does work.
gdb octopus_checker # In GDB file octopus_checker set disasembly intel disas main
Now it should spit out the correct addresses. I have nofucking clue why this ■■■■ works like that in this exercise. I messed around with reversing ■■■■ before this is the first time I had to respecify the file for the debugger to work…
Then again, I worked with Ghidra more than GDB so ye.
Retarded but it sometimes happens on this platform.
Still having the exact same issue here. Can confirm using the address they show on the module works, but still annoying.
Also encountered a problem where GDB refused to print the whole string associated with the register. The string was being cut short right before it revealed the credentials.
This command made it spit out the whole thing: print (char*)$rdx