Skip to Main Content
Mastering Reverse Engineering
book

Mastering Reverse Engineering

by Reginald Wong
October 2018
Beginner to intermediate content levelBeginner to intermediate
436 pages
9h 36m
English
Packt Publishing
Content preview from Mastering Reverse Engineering

Static analysis

The second piece of information that you'll need to know, next to knowing the filename, is the hash of the file. Let's pick Quickhash (https://quickhash-gui.org/) to help us with this task.  After opening the passcode.exe file using Quickhash, we can get the hash calculations for various algorithms.  The following screenshot shows the calculated SHA256 hash for the passcode.exe file:

The file has a name extension of .exe. This initially sets us to use tools for analyzing Windows executable files. However, to make sure that this is indeed a Windows executable, let's use TriD to get the file type. TrID (http://mark0.net/soft-trid-e.html ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reversing: Secrets of Reverse Engineering

Reversing: Secrets of Reverse Engineering

Eldad Eilam
Understanding the Linux Kernel, 3rd Edition

Understanding the Linux Kernel, 3rd Edition

Daniel P. Bovet, Marco Cesati

Publisher Resources

ISBN: 9781788838849Supplemental Content