The Basics of Hacking: Part 2by@silver.io
1,519 reads
1,519 reads

The Basics of Hacking: Part 2

by silver.io2mJanuary 27th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A C-program designed to accept and print command line arguments is a segmentation fault when it attempts to access memory it does not have access to. The “where” command seems to display a execution stack. This is how we can use the bt utility to examine the execution stack in gdb and hopefully use it as a tool to track down segmentation faults. This example highlights (indirectly) one other gdb tool that we haven’t discussed yet — “bt”
featured image - The Basics of Hacking: Part 2
silver.io HackerNoon profile picture
silver.io

silver.io

@silver.io

Engineering, hacking, surfing

About @silver.io
LEARN MORE ABOUT @SILVER.IO'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

silver.io HackerNoon profile picture
silver.io@silver.io
Engineering, hacking, surfing

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite