Intro to x86 and reverse engineering
We'll cover the concepts required to understand what stack frames look like and how memory is laid out (virtual memory), calling conventions, and what registers are and how they're conventionally used.
We'll also look at assembly instructions, and what they mean in order to be able to successfully reverse engineer a compiled binary (using tools like
If time allows, we'll start reverse engineering the CMU Binary Bomb and go through the process step by step.
Starts at Saturday July 09 2016, 11:00 AM. The sessions runs for about 1 hour.