I am trying to analyze a crackme file.
When I open it with gdb, I firstly set its SIGTRAP handler with, e.g., int80.SIGTRAP handler address 0x8011111.
I caught it through catch syscall signal in gdb. And, there are some traps in the application, some int3 interactions.
0x80abcde - int3
My gdbinit file is set like this:
b * 0x80abcde
commands 1
call (void)0x8011111(5)
continue
end
Is this okay for emulation or do I need to still push the calling address on the stack ?