{"id":2890,"date":"2012-05-17T21:07:37","date_gmt":"2012-05-17T21:07:37","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=2890"},"modified":"2019-05-23T21:07:07","modified_gmt":"2019-05-24T00:07:07","slug":"teste-6","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2012\/05\/diversos\/teste-6\/","title":{"rendered":"Debuggers"},"content":{"rendered":"<p>Apresentamos um excelente tutorial com o Debugger GDB. Posteriormente mostraremos a rela\u00e7\u00e3o da programa\u00e7\u00e3o Assembly com programa\u00e7\u00e3o em C na aplica\u00e7\u00e3o de SHELLCODES, vejam mais\u00a0 &#8230;<\/p>\n<p>&nbsp;<\/p>\n<p>Link: <a title=\"GDB\" href=\"http:\/\/faculty.kutztown.edu\/spiegel\/Debugging\/DebugPrimer.htm\">http:\/\/faculty.kutztown.edu\/spiegel\/Debugging\/DebugPrimer.htm<\/a><\/p>\n<p>Link:<a title=\"GDB\" href=\"http:\/\/www.delorie.com\/gnu\/docs\/gdb\/gdb.html#SEC_Top\"> http:\/\/www.delorie.com\/gnu\/docs\/gdb\/gdb.html#SEC_Top<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apresentamos um excelente tutorial com o Debugger GDB. Posteriormente mostraremos a rela\u00e7\u00e3o da programa\u00e7\u00e3o Assembly com programa\u00e7\u00e3o em C na aplica\u00e7\u00e3o de SHELLCODES, vejam mais\u00a0 &#8230; &nbsp; Link: http:\/\/faculty.kutztown.edu\/spiegel\/Debugging\/DebugPrimer.htm Link: http:\/\/www.delorie.com\/gnu\/docs\/gdb\/gdb.html#SEC_Top &nbsp;<\/p>\n","protected":false},"author":2,"featured_media":3317,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100],"tags":[97],"class_list":["post-2890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diversos","tag-debuggers"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/2890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=2890"}],"version-history":[{"count":14,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/2890\/revisions"}],"predecessor-version":[{"id":2892,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/2890\/revisions\/2892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/3317"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=2890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=2890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=2890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}