📔
Cyber Security Notes
search
Ctrlk
  • Introduction
  • CVEschevron-right
  • Paper Reviewschevron-right
  • brain-circuitLarge Language Modelschevron-right
  • Security Basics Noteschevron-right
  • Enumeration and Initial Compromisechevron-right
  • Post Exploitationchevron-right
  • Port Forwarding Cheatsheet
  • Powershell Essentialschevron-right
  • Application Securitychevron-right
  • Linux 64-bit Assemblychevron-right
    • GDB Basicschevron-right
      • My relevant GDB cheatsheet
      • Task 1 - Tamper strcmp logic
      • Breakpoints
      • Always starting with intel flavor
      • GDB TUI Mode
    • Basic Hello World Program
    • Registers in 64-bit
    • global directive
    • Reducing instructions and Removing NULL-> Optimizing memory in Assembly
    • Data Types
    • Endianness
    • Moving Data
    • push, pop, and the stack
    • Analysis - Writing data on memory location and referencing
    • Arithmetic Operations
    • Bitwise Logical Operations
    • Bit-Shifting Operations
    • Control Instructions
    • Loops
    • Procedures
    • Stack-Frames and Procedures
    • String Operations
    • Shellcoding basicschevron-right
  • Cloud Securitychevron-right
  • API Securitychevron-right
  • Reverse Engineeringchevron-right
  • CTF Challenge Learningschevron-right
  • Applied Cryptographychevron-right
  • Tools for everything
  • Opensslchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Linux 64-bit Assembly

GDB Basics

My relevant GDB cheatsheetchevron-rightTask 1 - Tamper strcmp logicchevron-rightBreakpointschevron-rightAlways starting with intel flavorchevron-rightGDB TUI Modechevron-right
PreviousLinux 64-bit Assemblychevron-leftNextMy relevant GDB cheatsheetchevron-right

Last updated 1 year ago

Was this helpful?

Was this helpful?