Reverse Engineering with Ghidra
Offered By: Hackaday via YouTube
Course Description
Overview
Dive into the second class of the Reverse Engineering with Ghidra series, focusing on advanced assembly language concepts and their implementation in reverse engineering. Explore function signatures, imports and exports, and various control flow structures including switch statements and loops. Gain insights into handling variables, functions, and heap memory in assembly language. Learn techniques for identifying and analyzing array accesses in disassembled code. Enhance your reverse engineering skills with practical examples and expert guidance from instructor Matthew Alt in this comprehensive one-hour session.
Syllabus
- Intro
- Assembly Language / Applying Function Signatures
- Imports and Exports
- Control Flow Statements in Assembly Language
- Switch Statements in Assembly Language
- Loops in Assembly Language
- Variables in Assembly Language
- Functions in Assembly Language
- Heap Memory
- Array Accesses in Assembly Language
Taught by
HACKADAY
Related Courses
Reverse Engineering: Ghidra For BeginnersUdemy Reverse Engineering Malware with Ghidra
Pluralsight Current Malware Analysis
YouTube Reverse Engineering and Malware Analysis
YouTube Reverse Engineering Tutorials
YouTube