The Basics of Hacking: Part 2by@silver.io
1,517 reads

The Basics of Hacking: Part 2

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

A C-program designed to accept and print command line arguments is a segmentation fault when it attempts to access memory it does not have access to. The “where” command seems to display a execution stack. This is how we can use the bt utility to examine the execution stack in gdb and hopefully use it as a tool to track down segmentation faults. This example highlights (indirectly) one other gdb tool that we haven’t discussed yet — “bt”
featured image - The Basics of Hacking: Part 2
silver.io HackerNoon profile picture

@silver.io

silver.io

Engineering, hacking, surfing


Receive Stories from @silver.io

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!