try break *0x0000000000400448
More Related Contents:
- How to disassemble 16-bit x86 boot sector code in GDB with “x/i $pc”? It gets treated as 32-bit
- Binary Bomb – Phase 4
- Show current assembly instruction in GDB
- Micro fusion and addressing modes
- Custom bootloader booted via USB drive produces incorrect output on some computers
- Difference between movq and movabsq in x86-64
- rbp not allowed as SIB base?
- What does cltq do in assembly?
- Bomb lab phase 5 – 6 char string, movzbl load, and $0xf, %ecx, and index an array with that?
- why we can’t move a 64-bit immediate value to memory?
- execve shellcode writing segmentation fault
- double condition checking in assembly
- Printing hex values in x86 assembly
- How exactly does the callstack work?
- What does the dollar sign ($) mean in x86 assembly when calculating string lengths like “$ – label”? [duplicate]
- Why not store function parameters in XMM vector registers?
- Segmentation fault when using DB (define byte) inside a function
- How to interpret objdump disassembly output columns?
- x86 LOCK question on multi-core CPUs
- Weird performance effects from nearby dependent stores in a pointer-chasing loop on IvyBridge. Adding an extra load speeds it up?
- How do vararg functions find out the number of arguments in machine code?
- Difference between MOVDQA and MOVAPS x86 instructions?
- Where is VPERMB in AVX2?
- How do GNU assembler x86 instruction suffixes like “.s” in “mov.s” work?
- Why mov/cmp instead of cmp with two memory operands? [duplicate]
- Purpose of ESI & EDI registers?
- Assembly x86 registers signed or unsigned
- How does the CPU know how many bytes it should read for the next instruction, considering instructions have different lengths?
- How many ways to set a register to zero?
- How to check the EIP value with assembly language? [duplicate]