Skip to main content

LLDB: A Comprehensive Guide to Debugging

 

CodeLLDB:
CodeLLDB is a powerful and flexible debugger extension for Visual Studio Code. It provides advanced debugging features for C, C++, and Rust applications.

LLDB Commands

Start Debugging a Program:

lldb <program>

Run the Program:

run

Set a Breakpoint:

breakpoint set --name <function_name>

Sets a breakpoint at the specified function.

Set a Breakpoint at a Specific Line:

breakpoint set --file <filename> --line <line_number>

Sets a breakpoint at a specific line in a file.

Set Conditional Breakpoints:

breakpoint set --name <function_name> --condition "<condition>"

Sets a breakpoint that only triggers when the condition is true.

List Breakpoints:

breakpoint list

Displays all breakpoints.

Step Over a Line:

next

Executes the next line of code but steps over function calls.

Step Into a Function:

step

Steps into a function if the current line calls one.

Continue Execution:

continue

Inspect Variables:

frame variable <variable_name>

Displays the value of a variable in the current scope.

Watch a Variable:

watchpoint set variable <variable_name>

Sets a watchpoint to monitor changes to a variable.

Inspect Call Stack:

thread backtrace

Displays the call stack of the current thread.

Inspect Memory:

memory read <address> --size <size>

Reads memory from the specified address.

Examine Memory:

memory read <address> --size <size> --format <format>

Reads the memory at a specific address. You can specify the size (--size) and format (--format, e.g., x for hexadecimal).

Dump Memory in Hexadecimal:

memory read <address> --size <size> --format x

Dumps memory in a hexadecimal format for easier inspection.

View Registers:

register read

Displays the values of all CPU registers.

Change Register Values:

register write <register_name> <value>

Modifies the value of a register.

List Disassembled Code:

disassemble --frame

Disassembles the current function’s code.

Disassemble a Specific Function:

disassemble --name <function_name>

Disassembles a specific function by name.

Evaluate Expressions:

expression <expression>

Evaluates an expression and print the result.

Additional Resources

  1. LLDB Tutorial
  2. GDB to LLDB command map

Comments

Popular posts from this blog

Bug Boundy Methodology, Tools & Resources

Start by defining a clear objective, such as exploiting a remote code execution (RCE) vulnerability or bypassing authentication on your target. Then, consider how you can achieve this goal using various attack vectors like XSS, SSRF, or others - these are simply tools to help you reach your objective. Use the target as how a normal user would, while browsing keep these questions in mind: 1)How does the app pass data? 2)How/where does the app talk about users? 3)Does the app have multi-tenancy or user levels? 4)Does the app have a unique threat model? 5)Has there been past security research & vulnerabilities? 6)How does the app handle XSS, CSRF, and code injection?

Install & set up mitmweb or mitmproxy in Linux

Step 1: Go to the mitmproxy page and download the binaries. Step 2: Install the downloaded tar file with the command " tar -xzf <filename>.tar.gz " Step 3: In the FoxyProxy add the proxy 127.0.0.1:8080  and turn it on. Step 4 : In the terminal run command " ./mitmweb " Step 5: Go to the page  http://mitm.it/   and download the mitmproxy's Certificate. Step 6: If you downloaded the certificate for Firefox, then go to " settings -> Privacy & Security -> Click View Certificates -> Click  Import ", then import the certificate.  Step 7: Now you are ready to capture the web traffic. Step 8 : In terminal run " ./mitmweb"

pip error in Kali Linux: error: externally-managed-environment : SOLVED

 error: externally-managed-environment × This environment is externally managed ╰─> To install Python packages system-wide, try apt install     python3-xyz, where xyz is the package you are trying to     install.     If you wish to install a non-Kali-packaged Python package,     create a virtual environment using python3 -m venv path/to/venv.     Then use path/to/venv/bin/python and path/to/venv/bin/pip. Make     sure you have pypy3-venv installed.     If you wish to install a non-Kali-packaged Python application,     it may be easiest to use pipx install xyz, which will manage a     virtual environment for you. Make sure you have pipx installed.     For more information, refer to the following:     * https://www.kali.org/docs/general-use/python3-external-packages/     * /usr/share/doc/python3.12/README.venv note: If you believe this is a mistake, please contac...