1581, 13/80 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   key
   gdb tip (at&t -> intel)

http://www.hackerschool.org/HS_Boards/zboard.php?id=Free_Lectures&no=616 [º¹»ç]


¸®´ª½º¿¡¼­ gdb¸¦ »ç¿ëÇؼ­ µð½º¾î¼Àºí Çغ¼¶§ AT&T ¹®¹ýÀ¸·Î ³ª¿Í¼­ intel ¹®¹ýÀ¸·Î °øºÎÇϽźеéÀº Çò°¥¸±¼öµµ ÀÖ°í º¸±â Èûµé¶§°¡ ÀÖ½À´Ï´Ù.

±×·²¶© ÀÌ ÇÑÁÙ·Î intel ¹®¹ýÀ¸·Î ¹Ù²Ù¾î º¸½Ç¼ö ÀÖ½À´Ï´Ù.

(gdb) set disassembly-flavor intel

¾Æ·¡´Â Àû¿ë½ÃÅ°±â Àü°ú Èĸ¦ µð½º¾î¼Àºí Çغ» °Í ÀÔ´Ï´Ù.


(gdb) disass main
Dump of assembler code for function main:
0x08048328 <main+0>:    push   %ebp
0x08048329 <main+1>:    mov    %esp,%ebp
0x0804832b <main+3>:    sub    $0x18,%esp
0x0804832e <main+6>:    and    $0xfffffff0,%esp
0x08048331 <main+9>:    mov    $0x0,%eax
0x08048336 <main+14>:   sub    %eax,%esp
0x08048338 <main+16>:   movl   $0xa,0xfffffffc(%ebp)
0x0804833f <main+23>:   mov    0x8048418,%eax
0x08048344 <main+28>:   mov    0x804841c,%edx
0x0804834a <main+34>:   mov    %eax,0xfffffff0(%ebp)
0x0804834d <main+37>:   mov    %edx,0xfffffff4(%ebp)
0x08048350 <main+40>:   sub    $0x4,%esp
0x08048353 <main+43>:   lea    0xfffffff0(%ebp),%eax
0x08048356 <main+46>:   push   %eax
0x08048357 <main+47>:   pushl  0xfffffffc(%ebp)
0x0804835a <main+50>:   push   $0x8048420
0x0804835f <main+55>:   call   0x8048268 <printf>
0x08048364 <main+60>:   add    $0x10,%esp
0x08048367 <main+63>:   leave
0x08048368 <main+64>:   ret
0x08048369 <main+65>:   nop
0x0804836a <main+66>:   nop
---Type <return> to continue, or q <return> to quit---
0x0804836b <main+67>:   nop
End of assembler dump.
(gdb) set disassembly-flavor intel
(gdb) disass main
Dump of assembler code for function main:
0x08048328 <main+0>:    push   ebp
0x08048329 <main+1>:    mov    ebp,esp
0x0804832b <main+3>:    sub    esp,0x18
0x0804832e <main+6>:    and    esp,0xfffffff0
0x08048331 <main+9>:    mov    eax,0x0
0x08048336 <main+14>:   sub    esp,eax
0x08048338 <main+16>:   mov    DWORD PTR [ebp-4],0xa
0x0804833f <main+23>:   mov    eax,ds:0x8048418
0x08048344 <main+28>:   mov    edx,ds:0x804841c
0x0804834a <main+34>:   mov    DWORD PTR [ebp-16],eax
0x0804834d <main+37>:   mov    DWORD PTR [ebp-12],edx
0x08048350 <main+40>:   sub    esp,0x4
0x08048353 <main+43>:   lea    eax,[ebp-16]
0x08048356 <main+46>:   push   eax
0x08048357 <main+47>:   push   DWORD PTR [ebp-4]
0x0804835a <main+50>:   push   0x8048420
0x0804835f <main+55>:   call   0x8048268 <printf>
0x08048364 <main+60>:   add    esp,0x10
0x08048367 <main+63>:   leave
0x08048368 <main+64>:   ret
0x08048369 <main+65>:   nop
0x0804836a <main+66>:   nop
---Type <return> to continue, or q <return> to quit---
0x0804836b <main+67>:   nop
End of assembler dump.
(gdb)


  Hit : 6753     Date : 2007/02/20 10:15



    
1341   °¢ ¶ó¿ìÅÍ µðÆúÆ® ºñ¹ø     ROK.AF
02/09 29626
1340   ÀͽºÃ¼ÀÎÁö ¼­¹ö 2000 µ¥ÀÌÅͺ£À̽º ±¸Á¶ [È«¼ø¼º±³¼ö´ÔÀÚ·á]     ROK.AF
02/09 8415
1339   ¸Þ¸ð¸® ´ýÇÁ(ºí·ç ½ºÅ©¸°=STOP ½ºÅ©¸°) ÄÚµå ¹× ÇØ°á[1]     ROK.AF
02/09 12901
1338   ÀÀ±Þº¹±¸ µð½ºÅ© ¸¸µå´Â ¹æ¹ý ¹× »ç¿ë ¹æ¹ý     ROK.AF
02/10 7595
1337   ±¹³» Ãâ°£µÈ MCSE °ü·Ã ¼­Àû ¸®½ºÆ®     ROK.AF
02/10 7342
1336   ÇØÅ·¿¡ °üÇÏ¿©[1]     vlmathlv
02/17 7443
1335   Å°º¸µå Æ®·¢Å·[1]     vlmathlv
02/18 7274
1334   ÇØÅ·°ú Å©·¡Å·ÀÇ ±âÁØ[6]     vlmathlv
02/20 6562
  gdb tip (at&t -> intel)     key
02/20 6752
1332   ¸®´ª½º¸í·É¾î ¶¯±â±â 1     HackerMapia
02/20 7505
1331   ¸®´ª½º¸í·É¾î ¶¯±â±â 2[2]     HackerMapia
02/20 7405
1330   * µµ½º ³»ºÎ¸í·É¾î 1 ½ÃÀÛ - ½ÇÇà - cmd *[1]     HackerMapia
02/20 9149
1329   * µµ½º ¿ÜºÎ¸í·É¾î 1 *[1]     HackerMapia
02/20 7848
1328   * µµ½º¸í·É¾î ÃÖ°­ÀÚ µÇ±â *[1]     HackerMapia
02/20 8794
1327   * ÇØÅ·¿µÈ­ º¼¸¸ÇÑ°Å *[5]     HackerMapia
02/20 11895
1326   * À©µµ¿ì Á¾·á¸¦ ºü¸£°Ô *[2]     HackerMapia
02/20 7947
1325   * À©µµ¿ì ´ÜÃàÅ° ¾Æ´Â°Íµé *[7]     HackerMapia
02/20 7439
1324   * Æò¹Îµé¿¡°Ô ±ÇÇÏ´Â Å×Å©´Ð *[14]     HackerMapia
02/20 8599
1323   ÇØÄ¿¶õ?[3]     vlmathlv
02/21 10396
1322   ÇÁ·Î±×·¡¹ÖÀ» ²À ¹è¿ö¾ß ÇÏ´Â °¡?[3]     vlmathlv
02/21 6901
[1]..[11][12] 13 [14][15][16][17][18][19][20]..[80]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org