Reversing a simple validation scheme.
Syllabus for Assembly I modules.
Looking at passing arguments to functions.
Taking a first look at a simple binary file.
When I was getting started I was told to read Practical Malware Analysis from No Starch Press. I can’t recommend the book enough. As far as prerequisites… Read more “Starting On Windows: PMA”
We’ve gone through the first two IOLI crackme binaries. That’s where the Radare2 book ends with the walkthroughs. That’s not where things are going to stop here… Read more “Getting Comfortable: More Radare2”
This post is going to continue with learning how to use Radare2 via the IOLI crackmes. Last time was more about one of the included tools, Rabin2. … Read more “Still Learning to Use Tools: Radare2”
Insert valuable reasonable advice about learning what tools are right for a job and the value of learning how to use them. Throw in some relevant quote… Read more “Learning To Use Tools: Radare2”
Last time we figured out a C program corresponded to a binary I had laying around. We figured out what the program was but didn’t discuss what… Read more “Computing Quick and Dirty”
The point of reverse engineering software is to determine what a program is going to do/designed to do. Not all programs do what they are designed to… Read more “Step One: Down The Rabbit Hole.”