Book Image

Penetration Testing with the Bash shell

By : Keith Harald Esrick Makan
Book Image

Penetration Testing with the Bash shell

By: Keith Harald Esrick Makan

Overview of this book

Table of Contents (13 chapters)

Disassembling binaries


As mentioned in the introduction of this chapter, reverse engineering is a crucial aspect of an all-effective security research. One important aspect of reverse engineering—of compiled executable files—is disassembly.

Disassembly is the process of reversing the effect of code compilation as much as possible. Kali Linux offers a few very good tools to orchestrate this process; however, when it comes to disassembly on the command line, very few tools come close to Objdump.

Disassembling with Objdump

In this section, we will learn how to use Objdump and some of its various invocation options to strip out various sections of information from the Executable and Linkable Format (ELF) binaries.

Tip

About the Executable and Linkable Format

ELF is the file format that packages executable, shared libraries, object files for Linux/Unix systems, and some of the their various derivatives.

Using Objdump is pretty straightforward though whether you'd be able to make use of it properly...