Abstract
In this present research, the tools such as debuggers and their use for ethical debugging and unethical, malicious use are analyzed. Debugger tool, in general, is used to analyze a program and make code debugging to detect vulnerabilities. But in reality, malicious people like cyber attackers are using such tools to misuse the system, find weak areas, and infect the system for malicious interests. Application-based interferences, containing based transformation of variables, malicious code penetration, security mechanism bypass, and the exploitation of weakness are the main functions of misusing a debugger tool. GNU or GDB debugger is used as a demo in this report to show how it is used. The paper also finds out ways to give security to the application by detecting the problem, avoiding any unauthorized intrusion, making preventive measures, and using roust coding policies. Developer awareness must also be enhanced to detect and predict such misuse of their program and take security measures to lower threats.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Engineering and Management Research
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.