Test platform is on 32-bit Linux. I use objdump to disassemble a stripped binary.
So in the disassemble asm code, I can see instructions like this:
80483e4: e8 07 ff ff ff call 80482f0
So basically e8 07 ff ff ff
is just a relative address of one entry of PLT...
So my question is:
Why tools like objdump (I also tried with IDA Pro) can figure out certain entries in PLT is used for relocation of puts?
I know Ida Pro can use some heuristic solutions to recognise certain functions, which is called F.L.I.R.T., but basically it is totally a different story....