This is the mail archive of the
gdb@sourceware.org
mailing list for the GDB project.
Re: Add to symbol table for reverse engineering?
- From: Daniel Jacobowitz <drow at false dot org>
- To: Nate Eldredge <neldredge at math dot ucsd dot edu>
- Cc: gdb at sourceware dot org
- Date: Wed, 18 Jul 2007 23:10:08 -0400
- Subject: Re: Add to symbol table for reverse engineering?
- References: <Pine.GSO.4.64.0707181341040.15725@zeno.ucsd.edu>
On Wed, Jul 18, 2007 at 02:56:39PM -0700, Nate Eldredge wrote:
> I am trying to reverse engineer a stripped binary using gdb. I wonder if there
> is a way to interactively add symbols as I go. For example, suppose I discover
> that 0xdeadbeef is the address of a function that does "foo". Presumably the
> binary originally had an entry "foo = 0xdeadbeef" in its symbol table, which is
> now gone. I would like to be able to "put it back" and use it with gdb's
> convenient symbol features. For instance, if I come across a "call 0xdeadbeef"
> instruction elsewhere in the program, I would like the gdb disassembler to tag
> it as "call 0xdeadbeef <foo>". Is there any way to do this? I didn't see such
> a thing in the manual.
Not using GDB. But you can probably do it with objcopy on the binary.
--
Daniel Jacobowitz
CodeSourcery