Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Reverse Engineering

Name: dancing boobies 2009-10-17 15:42

Hey there! This is my first post on /prog/

I've been a high level (games) programmer for over a decade now (C, C++, C#, JS, Python, BASIC, whatyouhave), and I'm very interested in learning some low level security stuff.

I'm fascinated by security, so I started reading some books and articles on hacking (ike Erickson's Art Of Exploitation or Smashing the Stack for Fun and Profit - ones that actually teach you methods instead of where to click in Kismet). I'd love to read some good books/articles on reverse engineering, preferably with good assembly language exposure. Have any that you could share titles of?

Crackme files and Hackme website links or irc channels with them would be nice, too.

Name: Anonymous 2009-10-17 15:45

dancing boobies
Hey there! This is my first post on /prog/
Don't worry. We can tell.

Name: Anonymous 2009-10-17 15:46

dancing boobies
( ≖‿≖)

Name: dancing boobies 2009-10-17 15:48

ps, I've watched a series of 5 videos on RE (in polish), they were quite good, but when I'm expected to do 'homework', I find that my knowledge of asm is seriously lacking - I understand what the single functions do, after all there is very limited number of them, but having only used high level languages so far, the advanced interactions between the mnemonics elude me.

Name: Anonymous 2009-10-17 16:06

>>2
i lold.
lol

Name: Anonymous 2009-10-17 16:07

>>1
tuts4you.com

good luck.

Name: Anonymous 2009-10-17 16:14

>>3
( ≖‿≖)
Saved as lispsmirk.txt.

Name: dancing boobies 2009-10-17 16:29

>>6
that website looks awesome. downloading the 'for newbies' tutorials. apparently they don't require any background in coding, so in exchange for getting bored on certain basics, there is a potential of learning the assembly to a useful level.

thank you.

Name: Anonymous 2009-10-17 18:33

>>1
For x86 asm and Win32:

Learn x86 assembler if that's what you'll be reversing.
Read the Intel manuals for this.

Learn your platform: have MSDN for API reference handy, and learn about the PE format well. Get some tools, you'd want OllyDbg, SoftICE/Syser for debuggers (ring3/ring0), IDA Pro (disassembler/debugger), a good hex editor like WinHex or Hiew, a PE editor like Lord PE or PETools, maybe some more specialized ones like imprec and relox for import/relocation rebuilding and learn your tools well.

I'm not sure if this is /prog/-related.

Name: Anonymous 2009-10-17 20:30

Back to /gorp/ please.

Name: Anonymous 2010-12-17 1:40

Erika once told me that Xarn is a bad boyfriend

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List