-
Book Overview & Buying
-
Table Of Contents
Reverse Engineering Armv8-A Systems
By :
In this section, we will analyze the call stack and stack dump using GDB. We will also discuss vulnerabilities that occur when the stack is corrupted.
How can the execution flow of a process be represented? In many cases, it is represented by the call stack. You can view the call stack in the GDB program, and it can also be found in various logs. However, the call stack is a high-level view. To fully understand how the call stack is printed, you need to understand the patterns of the binary data stored in the stack.
You can view the call stack using the backtrace (bt) command in GDB. How does GDB display the call stack? Here’s how GDB displays the call stack via the bt command, broken down as follows:
To better understand...