From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from simark.ca by simark.ca with LMTP id 4b4LKBk1EGVKGBwAWB0awg (envelope-from ) for ; Sun, 24 Sep 2023 09:09:45 -0400 Authentication-Results: simark.ca; dkim=pass (1024-bit key; secure) header.d=sourceware.org header.i=@sourceware.org header.a=rsa-sha256 header.s=default header.b=asKnkrle; dkim-atps=neutral Received: by simark.ca (Postfix, from userid 112) id 990D51E0C3; Sun, 24 Sep 2023 09:09:45 -0400 (EDT) Received: from server2.sourceware.org (ip-8-43-85-97.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (prime256v1) server-digest SHA256) (No client certificate requested) by simark.ca (Postfix) with ESMTPS id 875C71E092 for ; Sun, 24 Sep 2023 09:09:43 -0400 (EDT) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 5AA0B385B524 for ; Sun, 24 Sep 2023 13:09:42 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 5AA0B385B524 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1695560982; bh=kEGxOXId8ol6PZ1GlypazbFxX44A6GHvPgt1sRoXa5U=; h=Date:To:Subject:References:List-Id:List-Unsubscribe:List-Archive: List-Post:List-Help:List-Subscribe:From:Reply-To:From; b=asKnkrledHgRMci/AImoOOemAp017/02gMrxH6kqt+wUcmKw85eB02n6wFbxIG3kG iMzsLEX8T99izLzHpLRLDF10eHs0+MtaYfCuSvawcFQ03TVBKB9fT+uZBd5iHl7ZSn agKvQ1WklgkvjNVfrlxp8c5QGccacJK6HC3oYqzw= Received: from sonic321-28.consmr.mail.bf2.yahoo.com (sonic321-28.consmr.mail.bf2.yahoo.com [74.6.133.83]) by sourceware.org (Postfix) with ESMTPS id E79473858C50 for ; Sun, 24 Sep 2023 13:09:15 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org E79473858C50 X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1695560954; bh=gtOdlsGtf2iPBnQ6zUXGsdQ7/zDnKjE+2awiY7TYTpG=; h=X-Sonic-MF:Date:From:To:Subject:From:Subject; b=GyQCcfdnK2W94dnBXOZ4z3YVbYVtPJXgfVUgwHkJNLYG1DYddGjCZsQ2iHGcbJxxn5lHKYC+lyU17xe1imY3d/m7W7cUvqoYza07Z+4eanwmKx1zLaiI//XB9Ep38d+V1A5IbfuVvC0lvi8c7sqv0lBpWGx9vyjyrjtNH4Lg8e75m9BmMPuF452m23tt6dU2KGVqXOWr+Ph5R2GN0RIB+UUATMaPIAXKCZYrP6FWf+9MeVw9LnXUSnyODwFRxLqhaW9cB6gCN9cA0CdOZcTSqka9D3RLEariZR0/35xcx22o9Gyb22veAHRKFlRop2av87XJzILiNZkKPmeZsvH3rQ== X-YMail-OSG: HNLx7fQVM1lWthJcz7If9FGj.VVkWPLN8fIQZsVHJPQVjYq.2H8JzFviFXdwWCk hZ90BzFQtFkn4ZcwT0fbrevASE8ofoS09QjnI_uTbKLA.lrIX3GVil9p2X8dqwtLRRIL6jNqPteA cQd_kBwEVeTGZIC9olgpj4REB965bJ_8njwWcHTylT4xdNs8Tixf2zi1sOWIG.Aa5Ox6sP1FNmcz j8ZSy8fDXzXXNhXC73EzoLPDkk0E0kG6Mi5Il0M3_TIdshOiKui4sNjlOTkWACdWPZXn2NKlxHxL Kav8e.8vhxINuXQ4dVgnKZEoXrYlrphsmC3hFaozxhX7qYeeE1Lt2w8OycstH3xGCx5AXl6hv0xe 71GUt.NoWgcsITBTde1ECpcDIvX4VtMxSixMxOpz4fXjhQlpMD0g65V6w5gsGVbiJPl94jPVTCA3 UpBiSh_TMwHW0rWrwJ_axACFjneZxzmQHnKbiNK.cqWGp4Lmx1B9vuRMX_eXh7TaPXzDWK9sRIg7 6pFRSKl3z.PtyIOffDpyWUiEHPmjfyx._CVnXTRPlHa3J0bkga5Z3ucqQ.Ph.SkvaNU_45XvkQms q7BKWIDJFWNVAiAMz_eYBXrTSB4t_43j9UHIGoSN9gTJr.g3.xxOstAeHefLG41H6kzTSgka72P1 YUZ4k22PUGmGEzy5WkQCSFXsJ4Zy5sZf8IXDsmEH7hI2IuirVnbj0q3FT3De0rVXxvbK0WLK9m6O 43E193mb95kWBh3fAl9tYwIUMdE8G.I4wqK68R4oiSdRmmP5x.dXEDz5MI4euJKgyzepGeXDtMhc GNC0V_IeckQOUaN4CcfBUi0cb.aF5i6e5lHWmTpcqP7Yt85jlvaH4cLAT05mnLee4cWlEMNT9OhV NDHT5xPuH82YG0mIGdk12krCR_MOgvHp75o14b8shZ_TzfRU8lnSpQnqK9U2U.l7M7LDdu5J9cCR LhZ2nHHSWg.ddCx29WCuAQbBpfiYqVrPnysyT3aEo0KZrbvlZlCatoXsaiRHv4vISLw.QTejj7gc .ScbiN4.62e3DL.SjobbuDhdQUFf2h81G4kJlp8.5znVa2NIVb027sB7CJ6O3LVlaYyJ.s0it7qV Apqf2fl1LM1_fL1aN2sM4ZUHKUoCw_vSJm3RGDkumS59nOF.ZYxQ7ZTUQvUA07wGXvlp1YOmGjPV TO0WfhAWw4C1RThlcK8OP58YlBOPW8FXvARqA0FbB1425FIekmaUI19XLamyssRYPGtSYE8Otrqf HlvEt_xtr4GFFUaSrgruGFDq7tP2LprM97lW4lvTcXWoQcaYIz4RVhA1BcxIJwvUCsW6yqbL899v UJgn_6cYXFit2WEGi7_sbXqfHV0k2OS0o_tvfyWty5FLZfWC4.qlT90cLeN8pjehwPyCxA5Ki4yz RAr7gwyQvrPSIgjKcjOq8QULRcLlMsjFZaU_TjqUoGcUm7pn4bDBWc_4KEfj4qu6iLpnkJIL0W19 0g17_MxUlRV9PTNh0zFZwBNq7ex.KRdmaoO0nHyclhPtzvK5L0EZT36ehNP2D1vsu3_1KSfALKEH oJXkQJL4D8ozO4zChWCeLsaCMfW.KefF.duakPCiVBoMi1o1Qh.FAqd1LanFGy_kqPdlTErqjg5j tFU0EA9PqotjYR_lit8FVmDTwk1D.t_NI6oe1d4rJp5rh9AecNrH9HDT_wtxtzAEl3TA1YG8XxnX wfFON0l7j6r.Usmio8GpN7B8IxoYHo0v6kI93zI0n7hGbPlQ1Z7GuxtCt4pt.rha5G4db62hVBko FpRNlNM4hAKk_hxJlkOlDkvM3jEy1hFlCC_Ta8Ca_9mr7pGBOlnFzJRWn_EdZUQSs8RI6v1Nhyd2 RzHOS2zf5mfzD__g3tTrJTvAo9gF8vK8G5rYmC2f1faCuInUcOWRUxbOa7EbMURVfbSLTfkFUutb JcafeEJhpp1TTt6jsOHydKJIvr0z7vmZXuBBeRd_jEY7EIWLqWWRPfPzh8XoDNhLIZprcD1ro2Fh 65Qh3MueNIDIPYhRAKhT.Gqd6_xtj2IA8EYLM.nWKgoFMt6EJaS8ZVgczAXKY3Hyat5SkvQUp2tX nmjRPq45rlQdc_ddIVBXkZS5ElGnMc3Mm.1UyJSY_jLD5C1zE5Ky3RZpIRrgvjb6bW.k2TCVTvcm CSWLI3dVMQyHbeQIptJqqjFBnzgd_zRpDjYR2vR.fv8xdyz6ee0yDuuzJzChtE9fA2KsTwcvwe0F 9BsIXX8MKNvRpd9lnDYxOQcbCrJfIhCH2x.XPmlEDZ9vf82HH0_IvGvUM66fF5AJ7C2jJRQC9JlQ Y12rm9b2FsPTiVMJx8oqCvDuXNhQC0Vk- X-Sonic-MF: X-Sonic-ID: fbf86e1a-8f90-4502-9f92-70cfb59c2d54 Received: from sonic.gate.mail.ne1.yahoo.com by sonic321.consmr.mail.bf2.yahoo.com with HTTP; Sun, 24 Sep 2023 13:09:14 +0000 Date: Sun, 24 Sep 2023 13:09:09 +0000 (UTC) To: SCOTT FIELDS via Gdb Message-ID: <2065504698.3252109.1695560949235@mail.yahoo.com> Subject: Debugging vs Reverse Engineering MIME-Version: 1.0 References: <2065504698.3252109.1695560949235.ref@mail.yahoo.com> X-Mailer: WebService/1.1.21797 YahooMailAndroidMobile X-Spam-Status: No, score=1.4 required=5.0 tests=BAYES_20, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, HTML_MESSAGE, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Level: * X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.30 X-BeenThere: gdb@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gdb mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , From: Jason Long via Gdb Reply-To: Jason Long Errors-To: gdb-bounces+public-inbox=simark.ca@sourceware.org Sender: "Gdb" Hello folks,I have two questions: 1- Can a debugger like GDB be used to find the vulnerability? 2-=C2=A0When a hacker finds a vulnerability in a program, has that hacker u= sed debugging techniques or reverse engineering? Any idea welcomed. Thank you.