
Getting back to the objdump command, here is a sample of the output when disassembling the /bin/cat executable. But the intent was to carry out damage with this malware and compromise nuclear hardware.
#Disassemble hp p1006 printer code
That code was targeting specific hardware though.

The Stuxnet virus was disassembled and the source code was uploaded onto the Internet. But that is what that command could do for you.

That may not work but imagine if you could disassemble a closed source program and get a good idea of what the source code is and you were able to reverse engineer an open-source alternative. The objdump command may be used to disassemble a Linux executable into assembler source code it would be an interesting exercise to attempt to compile that code again and build a working executable again from the source. ~$ objdump -f /bin / cat /bin /cat: file format elf32-i386

gnu_debuglink 00000008 00000000 00000000 00009130 2**0Īnd this command to show the file header information in the Linux executable.

~$ objdump -h /bin / cat /bin /cat: file format elf32-i386Ġ.
