有关peda的一些说明

peda在github上的官方文档,摘抄过来,方便查阅。

安装

git clone https://github.com/longld/peda.git ~/peda
echo "source ~/peda/peda.py" >> ~/.gdbinit
  • Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.
  • Add commands to support debugging and exploit development (for a full list of commands use peda help):
    • aslr – Show/set ASLR setting of GDB
    • checksec – Check for various security options of binary
    • dumpargs – Display arguments passed to a function when stopped at a call instruction
    • dumprop – Dump all ROP gadgets in specific memory range
    • elfheader – Get headers information from debugged ELF file
    • elfsymbol – Get non-debugging symbol information from an ELF file
    • lookup – Search for all addresses/references to addresses which belong to a memory range
    • patch – Patch memory start at an address with string/hexstring/int
    • pattern – Generate, search, or write a cyclic pattern to memory
    • procinfo – Display various info from /proc/pid/
    • pshow – Show various PEDA options and other settings
    • pset – Set various PEDA options and other settings
    • readelf – Get headers information from an ELF file
    • ropgadget – Get common ROP gadgets of binary or library
    • ropsearch – Search for ROP gadgets in memory
    • searchmem|find – Search for a pattern in memory; support regex search //查找用,例如 searchmem “/bin/sh” libc
    • shellcode – Generate or download common shellcodes.
    • skeleton – Generate python exploit code template
    • vmmap – Get virtual mapping address ranges of section(s) in debugged process //可以用来查看栈、bss段是否可以执行
    • xormem – XOR a memory region with a key