Categories: Kali Linux

Peda – Python Exploit Development Assistance for GDB

PEDA is a python exploit development assistance for GDB.

Features

  • Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.
  • Add commands to support debugging and exploit development (for a full list of commands use peda help):
    • aslr — Show/set ASLR setting of GDB
    • checksec — Check for various security options of binary
    • dumpargs — Display arguments passed to a function when stopped at a call instruction
    • dumprop — Dump all ROP gadgets in specific memory range
    • elfheader — Get headers information from debugged ELF file
    • elfsymbol — Get non-debugging symbol information from an ELF file
    • lookup — Search for all addresses/references to addresses which belong to a memory range
    • patch — Patch memory start at an address with string/hexstring/int
    • pattern — Generate, search, or write a cyclic pattern to memory
    • procinfo — Display various info from /proc/pid/
    • pshow — Show various PEDA options and other settings
    • pset — Set various PEDA options and other settings
    • readelf — Get headers information from an ELF file
    • ropgadget — Get common ROP gadgets of binary or library
    • ropsearch — Search for ROP gadgets in memory
    • searchmem|find — Search for a pattern in memory; support regex search
    • shellcode — Generate or download common shellcodes.
    • skeleton — Generate python exploit code template
    • vmmap — Get virtual mapping address ranges of section(s) in debugged process
    • xormem — XOR a memory region with a key

PEDA Installation

git clone https://github.com/longld/peda.git ~/peda
echo "source ~/peda/peda.py" >> ~/.gdbinit
echo "DONE! debug your program with gdb and enjoy"

Also Readhtrace.sh – Simple Shell Script To Debugging Http/Https Traffic Tracing

Screenshot

R K

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

5 days ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

5 days ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

6 days ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

7 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

1 week ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

1 week ago