debugger
debugger copied to clipboard
Step over on a call instruction lets target run freely when using lldb to connect to a gdbserver
Repro steps:
- Download https://crackmes.one/crackme/66b5fa2c90c4c2830c821d0a to a Linux machine
- Run
gdbserver 0.0.0.0:31337 -- ./crackme666adv - Open the file in bina (on macOS)
- Debugger - Connect to remote process
- Input the IP address and connect to it
- Run the target until it breaks at the entry point
- Put a breakpoint on
00001325 call printf - Resume the target and wait for the breakpoint to be reached
- Step over
- Notice the target runs on its own and prompts for input, rather than breaking at
call printf
To be fair, there is some pecularity with this binary -- I tested with a helloword binary and we can step over on the printf call just normally