Session will walk through demonstrating various ways of tracking the run time issues using binary utilities available with `binutils` package and `gdb` debugger in absence of source code, just from binary executables or libraries. This session will help the audience understand the code flow from binary files alone, backtracking and formulating the potential source code, binary is generated form. Many kind of problems like symbol resolution failure, application crashes and deviation from standard programming practices can be identified using these tools, without access to actual source code of the application. These are the foundations of hacking and cracking. Some insight into system architecture (like registers and their usage) and assembly language and programming is helpful.