Support us on Patreon: http://bit.ly/38mnveC
This is a 5 part series showing you how to solve some of the reverse engineering exercises from the Practical Reverse Engineering book.
In the first video, we will earn about the stack and learn how to reverse engineer a simple function which loops through a null terminated char array and overwrites it's contents. This is Exercise 1 on Page 11.
Discussion: https://guidedhacking.com/threads/pr...lutions.15332/
Practical Reverse Engineering book: https://www.amazon.com/Practical-Reve...
https://read.amazon.com/?asin=B00IA22R2Y
This video is made by Ismael Vasquez Jr:
Website - https://ismaelvazquezjr.com
Twitter - https://twitter.com/IsmaelVazquezJr
Facebook - https://facebook.com/vazquezjrismael
Github - https://github.com/ismaelvazquezjr
LinkedIn - https://www.linkedin.com/in/ismael-vazquez-jr-a6abb119b
Reverse engineering is the process of analyzing software and understanding it, without having access to the source code. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now we can use the same tools to stop these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, system programmers, so they can learn how to use the same processes to stop hackers in their tracks.
- Offers a complete approach to understanding reverse engineering, with hands-on exercises and real-world examples
- Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
- Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers
- Includes a bonus chapter on reverse engineering tools
- Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a complete approach, with plenty of exercises and examples.
GH:
Donate on our Forum : http://bit.ly/2HkOco9
Support us on Patreon : http://bit.ly/38mnveC
Follow us on Facebook : http://bit.ly/2vvHfhk
Follow us on Twitter : http://bit.ly/3bC7J1i
Follow us on Twitch : http://bit.ly/39ywOZ2
Follow us on Reddit : http://bit.ly/3bvOB57
Follow us on GitHub : http://bit.ly/2HoNXIS
Follow us on Instagram : http://bit.ly/2SoDOlu
This is a 5 part series showing you how to solve some of the reverse engineering exercises from the Practical Reverse Engineering book.
In the first video, we will earn about the stack and learn how to reverse engineer a simple function which loops through a null terminated char array and overwrites it's contents. This is Exercise 1 on Page 11.
Discussion: https://guidedhacking.com/threads/pr...lutions.15332/
Practical Reverse Engineering book: https://www.amazon.com/Practical-Reve...
https://read.amazon.com/?asin=B00IA22R2Y
This video is made by Ismael Vasquez Jr:
Website - https://ismaelvazquezjr.com
Twitter - https://twitter.com/IsmaelVazquezJr
Facebook - https://facebook.com/vazquezjrismael
Github - https://github.com/ismaelvazquezjr
LinkedIn - https://www.linkedin.com/in/ismael-vazquez-jr-a6abb119b
Reverse engineering is the process of analyzing software and understanding it, without having access to the source code. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now we can use the same tools to stop these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, system programmers, so they can learn how to use the same processes to stop hackers in their tracks.
- Offers a complete approach to understanding reverse engineering, with hands-on exercises and real-world examples
- Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
- Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers
- Includes a bonus chapter on reverse engineering tools
- Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a complete approach, with plenty of exercises and examples.
GH:
Donate on our Forum : http://bit.ly/2HkOco9
Support us on Patreon : http://bit.ly/38mnveC
Follow us on Facebook : http://bit.ly/2vvHfhk
Follow us on Twitter : http://bit.ly/3bC7J1i
Follow us on Twitch : http://bit.ly/39ywOZ2
Follow us on Reddit : http://bit.ly/3bvOB57
Follow us on GitHub : http://bit.ly/2HoNXIS
Follow us on Instagram : http://bit.ly/2SoDOlu
Comment