The Basics of Hacking: Part 2

Written by silver.io | Published 2020/01/27
Tech Story Tags: hacking | cybersecurity | technology | the-basics-of-hacking | programming | c | why-learn-c | c-tutorials

TLDR A C-program designed to accept and print command line arguments is a segmentation fault when it attempts to access memory it does not have access to. The “where” command seems to display a execution stack. This is how we can use the bt utility to examine the execution stack in gdb and hopefully use it as a tool to track down segmentation faults. This example highlights (indirectly) one other gdb tool that we haven’t discussed yet — “bt”via the TL;DR App

no story

Written by silver.io | Engineering, hacking, surfing
Published by HackerNoon on 2020/01/27