- file
- strings
- hexdump: Show the content of a binary
- objdump: Show the elements (structure) of a binary
- ltrace: Intercepts dynamic library calls
- strace: Intercepts any syscall
- Disassemblers: Reverse into assembler language (e.g., IDA)
- Decompilers: Reverse binaries into higher-level languages, like C++
- Debuggers: Allows you to view and change the state of a running program (e.g., GDB)
- Hex editors: Allow youto view and edit contents of a binary (e.g., hexdump)
- GDB (debugger)
- Radare (debugger)
- Ghidra (decompiler)
- IDA (decompiler)
Open file in write
mode.
-A
is -aaa
. What are the steps it takes. Each step has the command responsible for it inside parentheses
$ r2 -w -A ./binary
Seek to main
> s main
Print disassembly file
> pdf
Create a jump to specific address
> wa jmp 0x0040096a