Cannot access memory at address // Debugging PIE Binaries affected by ASLR - bin 0x2E

Cannot access memory at address // Debugging PIE Binaries affected by ASLR - bin 0x2E

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=pphfcaGnWSA



Duration: 13:22
37,159 views
1,460


A typical error in gdb with setting breakpoints when dealing with binaries affected by ASLR is: "Cannot access memory at address 0x807". This can be quite frustrating at the beginning, especially if you don't know much about PIE yet. In this video I want to cover a few different ways how you can still debug them with gdb and Ghidra.

-=[ ๐Ÿ”ด Stuff I use ]=-

โ†’ Microphone:* https://geni.us/ntg3b
โ†’ Graphics tablet:* https://geni.us/wacom-intuos
โ†’ Camera#1 for streaming:* https://geni.us/sony-camera
โ†’ Lens for streaming:* https://geni.us/sony-lense
โ†’ Connect Camera#1 to PC:* https://geni.us/cam-link
โ†’ Keyboard:* https://geni.us/mech-keyboard
โ†’ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ โค๏ธ Support ]=-

โ†’ per Video: https://www.patreon.com/join/liveoverflow
โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ ๐Ÿ• Social ]=-

โ†’ Twitter: https://twitter.com/LiveOverflow/
โ†’ Website: https://liveoverflow.com/
โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
โ†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ ๐Ÿ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
gdb
debugging
binaries
debugger
ghidra
reverse engineering
cannot access memory
insert breakpoint
PIE
position independent
executable
code
position-independent
ASLR
address-space
layour randomization
randomisation
break
binary exploitation
buffer overflows
set breakpoints