1 / 3

> Reverse Engineering 1

> Reverse Engineering 1. > The path to becoming a true hacker…. You Thought It Was Going To Be A Long One (YTIWGTBALO).

wanda
Download Presentation

> Reverse Engineering 1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. > Reverse Engineering 1 > The path to becoming a true hacker…

  2. You Thought It Was Going To Be A Long One (YTIWGTBALO) • Reverse engineering is really a self-acquired skill. For this set of lessons, you will begin by completing the Reversing 1 – 5 challenges on ctf. After that, more challenges will be released over spring break. • You need things to help you reverse engineer applications. At CAMS CSC, we prefer to use OllyDbg 2.01 for debugging/reversing pc executable and GDB for reversing Linux ELFs. You might also need some cheating tools for the ctf challenges. ;) • Things you need to know right now: executables are decompiled to assembly code, which is extremely tedious to figure out and read. Sadly, I’m making you learn. There is not a single decompiler that can fully decompile the original source code.

  3. Common Assembly Code (ASM) • Assembly language is not impossible to understand. Let’s learn some ASM You can change asm code in the program and compile it. The compiled program will run your modified asm code. NOP – No operation. Replace any asm in the program with this if you want to take it out. JMP – Unconditional jump. The program will jump to the address noted. For example, replacing something with JMP 0x89AB will make the program jump to the address 0x89AB without doing anything. This is useful for skipping things.

More Related