More Assembly Code Hacking: Deciphering the Program Setup

The "Hello World" program I started disassembling in the last article has a fuck-ton of subroutines, surprising considering that the source code only had one. I am now making an effort to decipher and document all of them and figure out the exact course of system calls made in the execution of a printf() statement. … Continue reading More Assembly Code Hacking: Deciphering the Program Setup

Reverse-Engineering a Windows PE Binary

I'm excited, guys! I just made my first real foray into the guts of an executable file à la reverse-engineering with the Interactive Disassembler (IDA) from Hex-Rays. I'm using the freeware version of IDA, which means I don't get any tech support, so I've had to mostly figure out how to do everything myself (although … Continue reading Reverse-Engineering a Windows PE Binary