Skip to main content

How To Install GDB Peda?

Hello Friends,



Welcome Again. Today, I am going to show you How to Install GDB Peda Extension Quickly.
So, Let's Start With little bit of Basic Knowledge Sharing


Q. What is GDB?

Ans. GDB stands For GNU Debugger. It's an Open Source Command Line Based Debugger That Comes Pre-Installed In Most Linux Distribution. Its Really Very Easy To Use And Also Very Powerful. Come On Try It Once.

You Can Also Check, Alternate Option Radare2 Here.

And For GDB tutorial, Click Here

Q. What is Peda?

Ans. Peda Is Like A Extension Or Add-on For Gdb Debugger That help in Doing Many Process Easily, It also Adds Color and More Good Looking Command Line Based Interface Features That Makes GDB more user friendly. It Also Adds, Custom Command And Functionality And much More. Peda is Written In Python. Just Try it!

Q List of Custom Commands?


    aslr -- Show/set ASLR setting of GDB
    checksec -- Check for various security options of binary
    dumpargs -- Display arguments passed to a function when stopped at a call instruction
    dumprop -- Dump all ROP gadgets in specific memory range
    elfheader -- Get headers information from debugged ELF file
    elfsymbol -- Get non-debugging symbol information from an ELF file
    lookup -- Search for all addresses/references to addresses which belong to a memory range
    patch -- Patch memory start at an address with string/hexstring/int
    pattern -- Generate, search, or write a cyclic pattern to memory
    procinfo -- Display various info from /proc/pid/
    pshow -- Show various PEDA options and other settings
    pset -- Set various PEDA options and other settings
    readelf -- Get headers information from an ELF file
    ropgadget -- Get common ROP gadgets of binary or library
    ropsearch -- Search for ROP gadgets in memory
    searchmem|find -- Search for a pattern in memory; support regex search
    shellcode -- Generate or download common shellcodes.
    skeleton -- Generate python exploit code template
    vmmap -- Get virtual mapping address ranges of section(s) in debugged process
    xormem -- XOR a memory region with a key


Q How To Install It? 


git clone https://github.com/longld/peda.git ~/peda
echo "source ~/peda/peda.py" >> ~/.gdbinit
echo "DONE! debug your program with gdb and enjoy"
 
 
 

Related Post

Top Visited

Create Simple Packet Sniffer Using Python

how to install burp suite in Linux/Ubuntu 16.04

List of Keyboard Shortcuts Keys for GNOME Desktop (Kali linux / Linux / Ubuntu/*nix )

Big List Of Google Dorks For Sqli Injection

How to create Phishing Page Using Kali Linux | Webpage Page Cloning Using Kali Linux Social Engineering Toolkit

Latest Google Dorks List

Best 1000 User-agents List For Web Scraping

What is the use of Pseudo header in TCP/UDP packets?

How To Create Snake Game Using Python And Tkinter - Simple python games