In Part 1, Intro to Reverse Engineering – No Assembly Required, we extended the series of coding articles for non-programmers with an area of high interest in the infosec community. We’re proud to be able to bring you the highly anticipated follow-up complete with screen shots, sample code and applications. This one is long and detailed, so strap yourselves in for some great educational content. This paper is designed to outline some essential reverse engineering concepts, tools and techniques – primarily, debuggers and using the debugging process to reverse engineer application functions and algorithms. It is assumed you have knowledge of basic assembly and C programming. An understanding of Win32 programming and API calls is also helpful. This tutorial does not necessarily have to be read in order (although it is strongly advised), as some sections do not contain information that directly relates to subsequent sections. However, if you begin skipping around and find that you have trouble understanding a concept, or feel like you missed an explanation, it would be best to go back to previous sections of the tutorial and read them first.
Related Posts: On this day...
- Explosive pumpkin carving in science class - 2011
- The Master Switch: Tim "Net Neutrality" Wu explains what's at stake in the battle for net freedom - 2010
- Ron Paul takes on Michael Moore - 2009
- The raid that rocked the Met: Why gun and drugs op on 6,717 safety deposit boxes could cost taxpayer a fortune - 2009
- Police veteran critiques TSA procedure - 2009
- Blu-ray is dead - 2008