开发者

Android Native Debugging

开发者 https://www.devze.com 2023-01-16 15:50 出处:网络
I\'m currently working a project to investigate the security inherit with Android. A part of my project is to perform an overflow of the stack and execute a local shell.

I'm currently working a project to investigate the security inherit with Android. A part of my project is to perform an overflow of the stack and execute a local shell. I've created an exploitable application in native c, that is dynami开发者_如何学Pythoncally linked, installed it and executed it.

I'm having trouble using GDB. I want to know the location of the system and exit call addresses, using the command "p system". GDB keeps giving me an error "no symbol table". I've gave GDB the correct paths before attaching to the process and used the "shared" command. I'm really struggling, Has anyone got any clue to why this is happening.


Your native C application was compiled without the debug information. Try to compile your native code with '-static -g' options. Also, add to the native code a call to system() just to get this code disassembled in GDB.

0

精彩评论

暂无评论...
验证码 换一张
取 消