反汇编测试
作者:互联网
反汇编测试
作者:20191322wyl
目录源代码:
int g(int x){
return x+3;
}
int f(int x){
int i = 22;
return g(x)+i;
}
int main(void){
return f(8)+1;
}
安装库
sudo apt-get install libc6-dev-i386
编译
gcc -g week20191322.c -o example -m32
在64位的机器上产生32位汇编,然后使用gdb example
指令进入gdb调试器
分析过程
- 在main函数处设置一个断点
b main
,在r
一下,使用disassemble
获取汇编代码,用i(info) r(registers)
指令查看各寄存器的值:
-
使用命令
display /i $pc
设置每次都显示当前执行的命令 -
push
-
mov
-
sub
-
call
-
add
-
movl
-
push
-
call
-
add
-
mov
-
add
-
leave
-
ret
变化情况
20191322wyl | eax | ebp | esp | eip | 栈 |
---|---|---|---|---|---|
push | 0x56559000 | 0xffffd138 | 0xffffd130 | 0x5655619e | 0x565561db |
move | 0x56559000 | 0xffffd138 | 0xffffd12c | 0x5655619f | 0xfffd138 |
sub | 0x56559000 | 0xffffd12c | 0xffffd12c | 0x565561a1 | 0xffffd138 |
call | 0x56559000 | 0xffffd12c | 0xffffd11c | 0x565561a4 | 0x5655620d |
add | 0x565561a9 | 0xffffd12c | 0xffffd11c | 0x565561a9 | 0x5655620d |
movl | 0x56559000 | 0xffffd12c | 0xffffd11c | 0x565561ae | 0x5655620d |
push | 0x56559000 | 0xffffd12c | 0xffffd11c | 0x565561b5 | 0x5655620d |
call | 0x56559000 | 0xffffd12c | 0xffffd118 | 0x565561b8 | 0x8 |
add | 0xb | 0xffffd12c | 0xffffd118 | 0x565561bd | 0x8 |
mov | 0xb | 0xffffd12c | 0xffffd11c | 0x565561c0 | 0x5655620d |
add | 0xb | 0xffffd12c | 0xffffd11c | 0x565561c3 | 0x0 |
leave | 0x21 | 0xffffd12c | 0xffffd11c | 0x565561c5 | 0x5655620d |
ret | 0x21 | 0xffffd138 | 0xffffd130 | 0x565561c6 | 0x565561db |
标签:测试,int,0xffffd11c,0x5655620d,add,反汇编,0xffffd12c,0x56559000 来源: https://www.cnblogs.com/BillGreen/p/15516982.html