In this short video from our Software Reverse Engineering course we will learn how to write a simple program in Assembly. Having this skill is crucial for anyone who wants to reverse more complex pieces of software, and we hope this video sends you on your way there. Dive in!
Software Reverse Engineering Techniques is a field of work where you can have a binary file and revert it into a programming language (usually Assembly). It is very useful when you do not have the original source code (e.g. legacy code) and need to change something in the program or even debug it.
In the course:
In this first approach to reverse engineering, you will learn the things that you should know about Computer Organization, Machine Language, Assembly Language and the techniques related to these topics used to understand a program without having the original source code. The course was developed considering x86 32 and 64 bits architecture.
What skills will you gain?
- Emulating an architecture to understand how opcodes work;
- Understanding how a program works and modifying it;
- Removing small parts of a binary program;
- Adding new code to a binary program;
- Using a hexadecimal editor to change a binary on the hard drive;
Included in this course:
Workshop eBook - all materials from the course in one handy pdf for you to download and reference when you need it.
Reverse Engineering Guide - a full premium edition of our magazine, with a huge guide that will take you one step further once you finish the course. With this guide, you will develop your new skills more, on another hands-on example!
[custom-related-posts title="Related Posts:" none_text="None found" order_by="title" order="ASC"]
- BlogApril 7, 2022Detecting Fake Images via Noise Analysis | Forensics Tutorial [FREE COURSE CONTENT]
- BlogMarch 2, 2022Windows File System | Windows Forensics Tutorial [FREE COURSE CONTENT]
- BlogAugust 17, 2021PowerShell in forensics - suitable cases [FREE COURSE CONTENT]
- OpenMay 20, 2021Photographic Evidence and Photographic Evidence Tampering