Skip to content

Binary exploit toolkit

file

file <binary_name> | tee file.output.txt                                                                             

checksec

checksec <binary_name> | tee checksec.outout.txt

strings

strings <binary_name> | tee strings.outout.txt

ldd

ldd <binary_name>

msf-pattern

msf-pattern_create -l 200
msf-pattern_offset -l 200 -q Ab2A

GDB

show registry

info registers
i r

function address

gdb ./<binary_name>
x <function_name>

functions

info funcitons

dump

info frame  # to show the stack frame info
x/x $esp    # for hex 
x/d $esp    # for signed 
x/u $esp    # for unsigned
x/i $eip    # current instruction
x/100x $esp
x/-100x $esp