Finding main() in Stripped Binary - bin 0x2C

Finding main() in Stripped Binary - bin 0x2C

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=N1US3c6CpSw



Duration: 6:33
55,118 views
2,274


Stripped binaries miss the symbol information of functions and variables. Debugging such a binary is a little bit more tricky, but there is a simple method to find the main() function of the program.

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
stripped binary
gdb
debugging
strip symbols
missing symbols
can't find main()
__libc_start_main
finding main
break on main
gcc strip binary
stipped binaries
memory corruption
reverse engineering
binary exploitation