As mentioned in the introduction of this chapter, reverse engineering is a crucial aspect of an all-effective security research. One important aspect of reverse engineering—of compiled executable files—is disassembly.
Disassembly is the process of reversing the effect of code compilation as much as possible. Kali Linux offers a few very good tools to orchestrate this process; however, when it comes to disassembly on the command line, very few tools come close to Objdump.
In this section, we will learn how to use Objdump and some of its various invocation options to strip out various sections of information from the Executable and Linkable Format (ELF) binaries.
Tip
About the Executable and Linkable Format
ELF is the file format that packages executable, shared libraries, object files for Linux/Unix systems, and some of the their various derivatives.
Using Objdump is pretty straightforward though whether you'd be able to make use of it properly...