Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Windows Reversing Intro

via TryHackMe

Description

This room is part of a series of rooms that will introduce you to reverse engineering software on Windows. This is going to be a fairly short and easy room in which you will be introduced to how higher-level concepts look at a lower level. You will also start to get familiar with IDA. We will use the skills learned here to perform more advanced reverse engineering techniques in future rooms.

The programs provided in this room are compiled with MSVC (C++ compiler built-in with Visual Studio) set to release mode for x64. Debug binaries and symbols will not be used to teach with, however, debug symbols will be provided for those who are curious. This is done to make everything as realistic as possible. Debug symbols are a luxury when reverse engineering, and aren't common when dealing with executables.

Tags

Syllabus

  1. Intro Room Overview
  2. Intro IDA Overview
  3. Explanation Function Prologue/Epilogue
  4. Analysis Function Call Sample
  5. Analysis Loop Sample
  6. Explanation Structures
  7. Explanation DLL
  8. Conclusion

Online Course


Windows Reversing Intro

via TryHackMe
Affiliate notice

This room is part of a series of rooms that will introduce you to reverse engineering software on Windows. This is going to be a fairly short and easy room in which you will be introduced to how higher-level concepts look at a lower level. You will also start to get familiar with IDA. We will use the skills learned here to perform more advanced reverse engineering techniques in future rooms.

The programs provided in this room are compiled with MSVC (C++ compiler built-in with Visual Studio) set to release mode for x64. Debug binaries and symbols will not be used to teach with, however, debug symbols will be provided for those who are curious. This is done to make everything as realistic as possible. Debug symbols are a luxury when reverse engineering, and aren't common when dealing with executables.

  1. Intro Room Overview
  2. Intro IDA Overview
  3. Explanation Function Prologue/Epilogue
  4. Analysis Function Call Sample
  5. Analysis Loop Sample
  6. Explanation Structures
  7. Explanation DLL
  8. Conclusion