2007/8/17, pancake <[EMAIL PROTECTED]>:
>
> After the 0.8.2 release (codename: predefcon) I have managed to fix some
> little
> bugs in the radare core and spend more time on the debugger layer adding
> new
> commands, features and fixings bugs. I have integrated the debugger into
> the
> graphical frontend. Now you can "File -> Attach to pid", or "File -> Debug
> program".
>
> http://cvs.nopcode.org/gallery/shots/2007-08-13-000735_1280x800_scrot.png


very nice ;)
I think this would be very useful:

* let the user to change de flag values
* memory/register value breakpointing.
* step backwards
* emulate cpu jmp  (is in the TODO list)
* dump elf map to file

Peace.


At the moment I have centralized my efforts on x86 (on linux and *bsd), next
> week
> a w32 port project will probably start using windbg.dll as debugger api.
>
> A small piece of the changelog is:
>
> * add 'call' function for the debugger (emulates a cpu call)
> * add 'ret'  function in dbg (emulates a cpu ret) ( no recursive )
> * fixes the breakpoint handling bugs
> * add 'stepo' (so) (stepover) to step over calls and reps
> * in Visual debugger 's' steps one opcode and 'S' steps over
> * enhacements in the graphical frontend (keybindings, menus, ..)
> * Now with a 30% more of colors!
> * Fix write command on processes
> * Default syntax for assembly is intel, (not att)
> * add 'jmp' function
> * syms are loaded at startup of the debugger
> * syms are exported to shell and debugger as environment variables
>   (you can: !bp sym_main)
> * Fixed the signal riper
> * Add command 'pids' to list all attacheable pids (using kill() and /proc)
> * Add 'start2bin' rsc program and 'inject' command in debugger to
>   allow to inject code into the current program counter
> * Add 'pA' command (print analyze), it's useful to read the stack from
>   a process:
>
> [EMAIL PROTECTED] radare dbg:///bin/ls
> commandline="/bin/ls"
> ARGV[0]='/bin/ls'
> pid = 6475
> DEBUGGER: File '/bin/ls' opened.
> Loading symbols...
> Vopen ro dbg:///bin/ls
> flag 'eax.orig' at 0x0000000B and size 512
>
>
>
> [0xB7F1A8C0]> pA @esp
> 0xBF8F2A60 int be=0x01000000 le=0x00000001 (1)
> 0xBF8F2A64 int be=0x673a8fbf le=0xbf8f3a67 esp+0x00001007
>      0xBF8F3A67 string "/bin/ls"
> 0xBF8F2A68 (NULL)
> 0xBF8F2A6C int be=0x6f3a8fbf le=0xbf8f3a6f esp+0x0000100F
>      0xBF8F3A6F string "TERM=xterm"
> 0xBF8F2A70 int be=0x7a3a8fbf le=0xbf8f3a7a esp+0x0000101A
>      0xBF8F3A7A string "SHELL=/bin/bash"
> 0xBF8F2A74 int be=0x8a3a8fbf le=0xbf8f3a8a esp+0x0000102A
>      0xBF8F3A8A string "WINDOWID=29360141"
> 0xBF8F2A78 int be=0x9c3a8fbf le=0xbf8f3a9c esp+0x0000103C
>      0xBF8F3A9C string "XTERM_SHELL=/bin/bash"
>
>
> Have fun!
>
>   --pancake
> _______________________________________________
> radare mailing list
> [email protected]
> https://lists.nopcode.org/mailman/listinfo/radare
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
https://lists.nopcode.org/mailman/private/radare/attachments/20070818/340bd9f5/attachment.htm
 
_______________________________________________
radare mailing list
[email protected]
https://lists.nopcode.org/mailman/listinfo/radare

Reply via email to