After the 0.8.2 release (codename: predefcon) I have managed to fix some little
bugs in the radare core and spend more time on the debugger layer adding new
commands, features and fixings bugs. I have integrated the debugger into the
graphical frontend. Now you can "File -> Attach to pid", or "File -> Debug 
program".

 http://cvs.nopcode.org/gallery/shots/2007-08-13-000735_1280x800_scrot.png

At the moment I have centralized my efforts on x86 (on linux and *bsd), next 
week
a w32 port project will probably start using windbg.dll as debugger api.

A small piece of the changelog is:

* add 'call' function for the debugger (emulates a cpu call)
* add 'ret'  function in dbg (emulates a cpu ret) ( no recursive )
* fixes the breakpoint handling bugs
* add 'stepo' (so) (stepover) to step over calls and reps
* in Visual debugger 's' steps one opcode and 'S' steps over
* enhacements in the graphical frontend (keybindings, menus, ..)
* Now with a 30% more of colors!
* Fix write command on processes
* Default syntax for assembly is intel, (not att)
* add 'jmp' function
* syms are loaded at startup of the debugger
* syms are exported to shell and debugger as environment variables
  (you can: !bp sym_main)
* Fixed the signal riper
* Add command 'pids' to list all attacheable pids (using kill() and /proc)
* Add 'start2bin' rsc program and 'inject' command in debugger to
  allow to inject code into the current program counter
* Add 'pA' command (print analyze), it's useful to read the stack from
  a process:

[EMAIL PROTECTED] radare dbg:///bin/ls
commandline="/bin/ls"
ARGV[0]='/bin/ls'
pid = 6475
DEBUGGER: File '/bin/ls' opened.
Loading symbols...
Vopen ro dbg:///bin/ls
flag 'eax.orig' at 0x0000000B and size 512



[0xB7F1A8C0]> pA @esp
0xBF8F2A60 int be=0x01000000 le=0x00000001 (1)
0xBF8F2A64 int be=0x673a8fbf le=0xbf8f3a67 esp+0x00001007
     0xBF8F3A67 string "/bin/ls"
0xBF8F2A68 (NULL)
0xBF8F2A6C int be=0x6f3a8fbf le=0xbf8f3a6f esp+0x0000100F
     0xBF8F3A6F string "TERM=xterm"
0xBF8F2A70 int be=0x7a3a8fbf le=0xbf8f3a7a esp+0x0000101A
     0xBF8F3A7A string "SHELL=/bin/bash"
0xBF8F2A74 int be=0x8a3a8fbf le=0xbf8f3a8a esp+0x0000102A
     0xBF8F3A8A string "WINDOWID=29360141"
0xBF8F2A78 int be=0x9c3a8fbf le=0xbf8f3a9c esp+0x0000103C
     0xBF8F3A9C string "XTERM_SHELL=/bin/bash"


Have fun!

  --pancake
_______________________________________________
radare mailing list
[email protected]
https://lists.nopcode.org/mailman/listinfo/radare

Reply via email to