I wrote a new blog on generating test data for reverse engineering using gdb tricks! You can view it here:
https://www.skullsecurity.org/2023/gdb-tricks--tricking-the-application-into-generating-test-data
Which raises the question: are short-ish "tips and tricks for reversing" blogs helpful? I can certainly write more if people like them!
GDB Tricks: Tricking the Application into Generating Test Data
While reverse engineering a Linux binary, I ran into a fairly common situation: I wanted to understand how a decompression function works, but I didn’t have compressed data to test with. In this blog, I’ll look at how to we can manipulate the instruction pointer in the GNU debugger (gdb) to trick the software into generating test data for us! I posted this on Mastodon awhile back, but I cleaned it up and expanded it a bit to make it a full blog post.