Home > Package & System Management > objdump

objdump: Display Information for Object Files

This command analyzes and displays various information from binary files such as executable files, object files, and libraries. It is useful for debugging and reverse engineering as it can show assembly code, headers, sections, and symbol tables.

Overview

objdump extracts information from various object file formats like ELF, COFF, and a.out, presenting it in a human-readable form. It is primarily used for debugging, reverse engineering, and binary analysis, and is part of the GNU Binutils package.

Key Features

  • Disassembly of assembly code
  • Display of file header information
  • Display of section header information
  • Inspection of symbol tables
  • Examination of dynamic relocation information

Key Options

objdump provides a variety of options to analyze specific parts of binary files or control the output format.

Information Display

Output Format

Generated command:

Try combining the commands.

Description:

`objdump` Executes the command.

Combine the above options to virtually execute commands with AI.

Usage Examples

Demonstrates how to extract various information from binary files using objdump.

Disassemble Executable File

objdump -d /bin/ls

Displays the assembly code of the /bin/ls executable file.

View All Header Information

objdump -x /bin/ls

Displays detailed information for all headers of the /bin/ls file.

View Symbol Table

objdump -t /bin/ls

Displays a list of symbols (functions, variables, etc.) defined in the /bin/ls file.

Disassemble with Intel Syntax

objdump -M intel -d /bin/ls

Displays the assembly code of the /bin/ls file using Intel syntax.

View Section Headers of a Library File

objdump -h /lib/x86_64-linux-gnu/libc.so.6

Displays the section header information for a shared library file.

Tips & Notes

objdump is a powerful binary analysis tool, but its output requires a basic understanding of assembly language and binary file structures.

Usage Tips

  • It is useful to combine objdump with `grep`, for example: `objdump -d <file> | grep -A 20 <function_name>` to analyze specific functions.
  • It can also be used to analyze object files within shared library files (.so) or static library files (.a).
  • It is a key tool in various fields such as security vulnerability analysis, malware analysis, and system programming debugging.

Notes

objdump is a safe tool that only reads information from binary files without modifying them. However, the amount of output can be large, so it is important to use the necessary options precisely to extract only the desired information.


Same category commands