Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Step over on a call instruction lets target run freely when using lldb to connect to a gdbserver #610

Open
xusheng6 opened this issue Sep 2, 2024 · 1 comment

Comments

@xusheng6
Copy link
Member

xusheng6 commented Sep 2, 2024

Repro steps:

  1. Download https://crackmes.one/crackme/66b5fa2c90c4c2830c821d0a to a Linux machine
  2. Run gdbserver 0.0.0.0:31337 -- ./crackme666adv
  3. Open the file in bina (on macOS)
  4. Debugger - Connect to remote process
  5. Input the IP address and connect to it
  6. Run the target until it breaks at the entry point
  7. Put a breakpoint on 00001325 call printf
  8. Resume the target and wait for the breakpoint to be reached
  9. Step over
  10. Notice the target runs on its own and prompts for input, rather than breaking at call printf
@xusheng6
Copy link
Member Author

xusheng6 commented Nov 7, 2024

To be fair, there is some pecularity with this binary -- I tested with a helloword binary and we can step over on the printf call just normally

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant