Reverse_Engineering.pdf

(1237 KB) Pobierz
Reverse
Engineering
Mitchell Adair
January, 2014
About Me
Know Owen from our time at Sandia National
Labs
Currently work for Raytheon
Founded UTDallas’s Computer Security Group
(CSG) in Spring 2010
Reversing, binary auditing, fuzzing, exploit dev,
pen testing…
Python
:P
Goal
At the end of this, you should feel comfortable
o
Being handed a binary
o
Examining a binaries sections, imports, strings
o
Renaming and simplifying the disassembly
o
Converting from assembly to source, where needed
o
Understanding process memory layout
o
Figuring out function arguments and local variables
How many and what types
o
Using a debugger to fill in the gaps or manipulate
program execution
Outline
Static vs Dynamic (overview)
PE and ELF
Assembly
Registers
The Stack
Functions
IDA
Debugging
Apply the
new
Note on Bytecode
knowledge
Conclusion
Try to
reverse
Learn
something
new
Zgłoś jeśli naruszono regulamin