Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

debug an executable with dive into its libraries #22508

Open
amir-hoseyn77 opened this issue Dec 14, 2023 · 2 comments
Open

debug an executable with dive into its libraries #22508

amir-hoseyn77 opened this issue Dec 14, 2023 · 2 comments

Comments

@amir-hoseyn77
Copy link

I have an executable ELF file e.g. aaa. This executable file uses its library e.g. ../bin/libaaa.so. When I debug r2 -d aaa I see some call functions from the library libaaa.so e.g. sym.imp.AAAfunc1 at 0x44651.
When I reach that call, I can only step over it. How can I deep dive into libaaa.so file to debug that function contents?

@gogo2464
Copy link
Contributor

gogo2464 commented Dec 23, 2023

Do you plan to get function body? it is not possible. you need to open the .so itself.

@gogo2464
Copy link
Contributor

oh sorry.I was just testing and no. I misundertood your question. You misuse r2.

pd 1
mov rax, qword [sym.imp.KERNEL32.dll_IsDebuggerPresent]

could you try same command with aaaaa then let's try to read the .got. you should read library call. then read access to got.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants