2007/8/17, pancake <[EMAIL PROTECTED]>: > > After the 0.8.2 release (codename: predefcon) I have managed to fix some > little > bugs in the radare core and spend more time on the debugger layer adding > new > commands, features and fixings bugs. I have integrated the debugger into > the > graphical frontend. Now you can "File -> Attach to pid", or "File -> Debug > program". > > http://cvs.nopcode.org/gallery/shots/2007-08-13-000735_1280x800_scrot.png
very nice ;) I think this would be very useful: * let the user to change de flag values * memory/register value breakpointing. * step backwards * emulate cpu jmp (is in the TODO list) * dump elf map to file Peace. At the moment I have centralized my efforts on x86 (on linux and *bsd), next > week > a w32 port project will probably start using windbg.dll as debugger api. > > A small piece of the changelog is: > > * add 'call' function for the debugger (emulates a cpu call) > * add 'ret' function in dbg (emulates a cpu ret) ( no recursive ) > * fixes the breakpoint handling bugs > * add 'stepo' (so) (stepover) to step over calls and reps > * in Visual debugger 's' steps one opcode and 'S' steps over > * enhacements in the graphical frontend (keybindings, menus, ..) > * Now with a 30% more of colors! > * Fix write command on processes > * Default syntax for assembly is intel, (not att) > * add 'jmp' function > * syms are loaded at startup of the debugger > * syms are exported to shell and debugger as environment variables > (you can: !bp sym_main) > * Fixed the signal riper > * Add command 'pids' to list all attacheable pids (using kill() and /proc) > * Add 'start2bin' rsc program and 'inject' command in debugger to > allow to inject code into the current program counter > * Add 'pA' command (print analyze), it's useful to read the stack from > a process: > > [EMAIL PROTECTED] radare dbg:///bin/ls > commandline="/bin/ls" > ARGV[0]='/bin/ls' > pid = 6475 > DEBUGGER: File '/bin/ls' opened. > Loading symbols... > Vopen ro dbg:///bin/ls > flag 'eax.orig' at 0x0000000B and size 512 > > > > [0xB7F1A8C0]> pA @esp > 0xBF8F2A60 int be=0x01000000 le=0x00000001 (1) > 0xBF8F2A64 int be=0x673a8fbf le=0xbf8f3a67 esp+0x00001007 > 0xBF8F3A67 string "/bin/ls" > 0xBF8F2A68 (NULL) > 0xBF8F2A6C int be=0x6f3a8fbf le=0xbf8f3a6f esp+0x0000100F > 0xBF8F3A6F string "TERM=xterm" > 0xBF8F2A70 int be=0x7a3a8fbf le=0xbf8f3a7a esp+0x0000101A > 0xBF8F3A7A string "SHELL=/bin/bash" > 0xBF8F2A74 int be=0x8a3a8fbf le=0xbf8f3a8a esp+0x0000102A > 0xBF8F3A8A string "WINDOWID=29360141" > 0xBF8F2A78 int be=0x9c3a8fbf le=0xbf8f3a9c esp+0x0000103C > 0xBF8F3A9C string "XTERM_SHELL=/bin/bash" > > > Have fun! > > --pancake > _______________________________________________ > radare mailing list > [email protected] > https://lists.nopcode.org/mailman/listinfo/radare > -------------- next part -------------- An HTML attachment was scrubbed... URL: https://lists.nopcode.org/mailman/private/radare/attachments/20070818/340bd9f5/attachment.htm _______________________________________________ radare mailing list [email protected] https://lists.nopcode.org/mailman/listinfo/radare
