Difference between revisions of "Reverse engineering"
From Gender and Tech Resources
(Created page with "Learn about reverse engineering and backdooring hosts, discover memory corruption, code injection, and general data- or file-handling flaws that may be used to instantiate arb...") |
m |
||
Line 6: | Line 6: | ||
=== Disassembly === | === Disassembly === | ||
Disassembly is the process of reversing the effect of code compilation as much as possible. And does not make sense at all if you know nothing about the parts of your processor that are made visible to machine instructions. Minimally you need to know about its registers (which can be bit-vector/integer, floating point, machine address), how Arithmetic Logic Units work, how clocking circuits works and why some instructions take more than one clock, how first and second level caches work, how Memory Management Units and Direct Memory Access work, etc. | Disassembly is the process of reversing the effect of code compilation as much as possible. And does not make sense at all if you know nothing about the parts of your processor that are made visible to machine instructions. Minimally you need to know about its registers (which can be bit-vector/integer, floating point, machine address), how Arithmetic Logic Units work, how clocking circuits works and why some instructions take more than one clock, how first and second level caches work, how Memory Management Units and Direct Memory Access work, etc. | ||
+ | |||
+ | == Resources == | ||
+ | |||
+ | === News & watchdogs === | ||
+ | * Phrack http://www.phrack.com/ | ||
+ | |||
+ | === Reverse engineering === | ||
+ | * Academy of Reverse Engineering http://www.woodmann.com (ancient academy projects http://www.woodmann.com/fravia/academy.htm) | ||
+ | * DigiCrime, Inc. http://www.digicrime.com/dc.html | ||
+ | * Guide to Lock Picking http://www.lysator.liu.se/mit-guide/mit-guide.html | ||
+ | |||
+ | == Related == | ||
+ | |||
+ | == References == |
Latest revision as of 08:47, 31 July 2015
Learn about reverse engineering and backdooring hosts, discover memory corruption, code injection, and general data- or file-handling flaws that may be used to instantiate arbitrary code execution vulnerabilities.
Contents
Metasploit
First some preps that make life a little easier. Metasploit can be used in the environment of the bash shell.
Disassembly
Disassembly is the process of reversing the effect of code compilation as much as possible. And does not make sense at all if you know nothing about the parts of your processor that are made visible to machine instructions. Minimally you need to know about its registers (which can be bit-vector/integer, floating point, machine address), how Arithmetic Logic Units work, how clocking circuits works and why some instructions take more than one clock, how first and second level caches work, how Memory Management Units and Direct Memory Access work, etc.
Resources
News & watchdogs
- Phrack http://www.phrack.com/
Reverse engineering
- Academy of Reverse Engineering http://www.woodmann.com (ancient academy projects http://www.woodmann.com/fravia/academy.htm)
- DigiCrime, Inc. http://www.digicrime.com/dc.html
- Guide to Lock Picking http://www.lysator.liu.se/mit-guide/mit-guide.html