Abstract

Intro to x86 and reverse engineering

We'll cover the concepts required to understand what stack frames look like and how memory is laid out (virtual memory), calling conventions, and what registers are and how they're conventionally used.
We'll also look at assembly instructions, and what they mean in order to be able to successfully reverse engineer a compiled binary (using tools like strings and objdump).

If time allows, we'll start reverse engineering the CMU Binary Bomb and go through the process step by step.

Speaker

Amaan Cheval

Timing

Starts at Saturday July 09 2016, 11:00 AM. The sessions runs for about 1 hour.

Resources