Home
Add Document
Sign In
Create An Account
Document not found! Please try again
What is Reverse Engineering - Open Security Training
Recommend Documents
No documents
What is Reverse Engineering - Open Security Training
Download PDF
0 downloads
184 Views
146KB Size
Report
Comment
Introduction to Reverse Engineering Software. Fine-granularity class topics covered. Frank Poz. CC BY AT licensed hosted
What is Reverse Engineering (RE)?
Know your tools
Refresher
Introduction to Reverse Engineering Software Fine-granularity class topics covered Frank Poz CC BY AT licensed hosted at OpenSecurityTraining.info
A basic RE algorithm
Day 1 review 1
Debugging
Analyzing C++
About the next class
Other languages
click on green nodes to jump to that topic in the videos
What kind of questions can you answer with RE?
Intro x86
PE Files
For loops
Applying the RE algorithm to the bomb lab Phase 1
Algorithms
Data Types & Structures
IDA Pro
Labs Outline
Setting a bomb lab answers file
Phase 2 introduction
Phase 3 introduction
Phase 4 introduction
Array accesses
Multiple/ variable argument functions
Phase 2 walkthrough
Phase 3 walkthrough
Recursion
Stack frame explanation
Why use a debugger?
Phase 5 introduction
Phase 4 walkthrough
String decoding
bitmasks
Phase 5 walkthrough
Reminder: What is "dl" (or al or bl or cl)?
Types of breakpoints
IDA as a debugger
Phase 6 introduction 1
Single stepping
Nested loops
Structures
Linked lists
Defining structs in IDA
Conditional jumps in IDA
EFLAGS register in IDA
Passing command line arguments to a debugged program in IDA
Day 1 review 2
The "this" pointer and virtual function tables ("vtables")
Object member access
Constructors and Destructors
Example: class_0.ex_
Phase 6 introduction 2
Structs example: struct_introduction.ex_
Applying structs to assembly in IDA
Applying structs to memory in IDA
Phase 6 walkthrough 1
Loop collapsing in IDA
Identifying a linked list in memory
Defining the struct in IDA
Applying a struct to a memory block in IDA
Understanding the first nested loops
Phase 6 walkthrough 2
Understanding the next set of nested loops
Understanding the last loop
Analyzing the pseudo-code
Example: class_1.ex_
Inheritance Example: class_2.ex_
Java
Day 2 review
×
Report "What is Reverse Engineering - Open Security Training"
Your name
Email
Reason
-Select Reason-
Pornographic
Defamatory
Illegal/Unlawful
Spam
Other Terms Of Service Violation
File a copyright complaint
Description
×
Sign In
Email
Password
Remember me
Forgot password?
Sign In
Our partners will collect data and use cookies for ad personalization and measurement.
Learn how we and our ad partner Google, collect and use data
.
Agree & close