Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- gdb-peda$ target remote 192.168.101.1:9001
- Remote debugging using 192.168.101.1:9001
- warning: No executable has been specified and target does not support
- determining executable automatically. Try using the "file" command.
- 0x2bbfb25c in ?? ()
- gdb-peda$ info proc mappings
- process 10101
- Mapped address spaces:
- Start Addr End Addr Size Offset objfile
- 0x400000 0x4be000 0xbe000 0x0 /bin/boa
- 0x4ce000 0x4d1000 0x3000 0xbe000 /bin/boa
- 0x4d1000 0x4d4000 0x3000 0x0
- 0x6d2000 0x6dd000 0xb000 0x0 [heap]
- 0x2b7aa000 0x2b7af000 0x5000 0x0 /lib/ld-uClibc-0.9.30.3.so
- 0x2b7af000 0x2b7b0000 0x1000 0x0
- 0x2b7be000 0x2b7bf000 0x1000 0x4000 /lib/ld-uClibc-0.9.30.3.so
- 0x2b7bf000 0x2b7c0000 0x1000 0x5000 /lib/ld-uClibc-0.9.30.3.so
- 0x2b7c0000 0x2b7c2000 0x2000 0x0 /lib/libomci_api.so
- 0x2b7c2000 0x2b7d1000 0xf000 0x0
- 0x2b7d1000 0x2b7d2000 0x1000 0x1000 /lib/libomci_api.so
- 0x2b7d2000 0x2b891000 0xbf000 0x0 /lib/libmib.so
- 0x2b891000 0x2b8a1000 0x10000 0x0
- 0x2b8a1000 0x2b8a4000 0x3000 0xbf000 /lib/libmib.so
- 0x2b8a4000 0x2b977000 0xd3000 0x0 /lib/librtk.so
- 0x2b977000 0x2b986000 0xf000 0x0
- 0x2b986000 0x2b9a2000 0x1c000 0xd2000 /lib/librtk.so
- 0x2b9a2000 0x2b9a3000 0x1000 0x0
- 0x2b9a3000 0x2b9a9000 0x6000 0x0 /lib/libcrypt-0.9.30.3.so
- 0x2b9a9000 0x2b9b8000 0xf000 0x0
- 0x2b9b8000 0x2b9b9000 0x1000 0x5000 /lib/libcrypt-0.9.30.3.so
- 0x2b9b9000 0x2b9ca000 0x11000 0x0
- 0x2b9ca000 0x2b9cc000 0x2000 0x0 /lib/libmd5.so
- 0x2b9cc000 0x2b9db000 0xf000 0x0
- 0x2b9db000 0x2b9dc000 0x1000 0x1000 /lib/libmd5.so
- 0x2b9dc000 0x2ba22000 0x46000 0x0 /lib/libssl.so.0.9.8
- 0x2ba22000 0x2ba31000 0xf000 0x0
- 0x2ba31000 0x2ba34000 0x3000 0x45000 /lib/libssl.so.0.9.8
- 0x2ba34000 0x2bb96000 0x162000 0x0 /lib/libcrypto.so.0.9.8
- 0x2bb96000 0x2bba6000 0x10000 0x0
- 0x2bba6000 0x2bbb8000 0x12000 0x162000 /lib/libcrypto.so.0.9.8
- 0x2bbb8000 0x2bbba000 0x2000 0x0
- 0x2bbba000 0x2bbc9000 0xf000 0x0 /lib/libpthread-0.9.30.3.so
- 0x2bbc9000 0x2bbd8000 0xf000 0x0
- 0x2bbd8000 0x2bbdd000 0x5000 0xe000 /lib/libpthread-0.9.30.3.so
- 0x2bbdd000 0x2bbdf000 0x2000 0x0
- 0x2bbdf000 0x2bbe1000 0x2000 0x0 /lib/libdl-0.9.30.3.so
- 0x2bbe1000 0x2bbf0000 0xf000 0x0
- 0x2bbf0000 0x2bbf1000 0x1000 0x1000 /lib/libdl-0.9.30.3.so
- 0x2bbf1000 0x2bbf2000 0x1000 0x2000 /lib/libdl-0.9.30.3.so
- 0x2bbf2000 0x2bc32000 0x40000 0x0 /lib/libuClibc-0.9.30.3.so
- 0x2bc32000 0x2bc41000 0xf000 0x0
- 0x2bc41000 0x2bc43000 0x2000 0x3f000 /lib/libuClibc-0.9.30.3.so
- 0x2bc43000 0x2bc46000 0x3000 0x0
- 0x2bc46000 0x2bc57000 0x11000 0x0 /lib/libgcc_s.so.1
- 0x2bc57000 0x2bc67000 0x10000 0x0
- 0x2bc67000 0x2bc68000 0x1000 0x11000 /lib/libgcc_s.so.1
- 0x2bc68000 0x2bc92000 0x2a000 0x0 /lib/libmultilang_en.so
- 0x2bc92000 0x2bca1000 0xf000 0x0
- 0x2bca1000 0x2bca6000 0x5000 0x29000 /lib/libmultilang_en.so
- 0x7fe10000 0x7fe31000 0x21000 0x0 [stack]
- 0x7fff7000 0x7fff8000 0x1000 0x0 [vdso]
- # Now, I can see there is a memory address inside Program counter (0x27bd0020)
- gdb-peda$ x/x $pc
- 0x2bbfb25c: 0x27bd0020
- # However, when I go to 0x27bd0020, it shows the following error
- gdb-peda$ x/100 *0x27bd0020
- Cannot access memory at address 0x27bd0020
Add Comment
Please, Sign In to add comment