Windows Reversing Intro
Offered By: TryHackMe
Course Description
Overview
This room is part of a series of rooms that will introduce you to reverse engineering software on Windows. This is going to be a fairly short and easy room in which you will be introduced to how higher-level concepts look at a lower level. You will also start to get familiar with IDA. We will use the skills learned here to perform more advanced reverse engineering techniques in future rooms.
The programs provided in this room are compiled with MSVC (C++ compiler built-in with Visual Studio) set to release mode for x64. Debug binaries and symbols will not be used to teach with, however, debug symbols will be provided for those who are curious. This is done to make everything as realistic as possible. Debug symbols are a luxury when reverse engineering, and aren't common when dealing with executables.
Syllabus
- Intro Room Overview
- Intro IDA Overview
- Explanation Function Prologue/Epilogue
- Analysis Function Call Sample
- Analysis Loop Sample
- Explanation Structures
- Explanation DLL
- Conclusion
Taught by
Z0F
Related Courses
Malware Analysis: Identifying and Defeating PackingPluralsight Malware Analysis: Identifying and Defeating Code Obfuscation
Pluralsight Getting Started with Reverse Engineering
Pluralsight Reverse Engineering: IDA For Beginners
Udemy Malware Analysis and Reverse Engineering Course
YouTube