I have an ELF object file. I want to know which type of debugging info it contains. It was compiled with the Diab compiler (C source) for the PPC architecture. I\'m pret开发者_如何学Cty sure it was bu
I have successfully parsed an elf file (executable file) compiled from multiple source files. I am able to get the binding(local,global,weak), type(object,file,section,function), size of the symbol an
I need to make a debug shell inside each c exe(linux enviroment), and my solution is as follows: Read elf symbols from exe file, build a symbol->address table in
I\'m learning currently x86 assembly and trying some reverse engineering on a regular x86 elf executable. Now the开发者_StackOverflow社区re are multiple sections like init main etc.
void*entrypoint; /*virtual address of process*/ fscanf(debuggedfile, \"%p\", &entrypoint); where debuggedfile is the stream to an elf f开发者_如何学Goile at the offset where int entry point is.
i\'m working on program that will analyze object files in ELF and PE formats (kind of school/research project). Right now i\'m about to process dynamic import symbols in executable files. I would like
First of all, I\'m asking this from a technical perspective, not a perspective of the user of library code. One example of a difference is that shared objects contain program headers and ordinary obje
How do I wrap Elf32_Ehdr and El开发者_运维技巧f64_Ehdr so that on 64 bit architectures Elf64_Ehdr and Elf32_Ehdr on 32 bit ones?#include <stdint.h>
开发者_JAVA技巧Suppose the binary is PIC, how can I load it into memory and execute the entry point?
Is it possible to trace loading of开发者_高级运维 ELF executable from typing name of program and pressing enter until execution of main function? If yes, then how to do this?man ld.so