Skip to Main Content
Mastering Reverse Engineering
book

Mastering Reverse Engineering

by Reginald Wong
October 2018
Beginner to intermediate content levelBeginner to intermediate
436 pages
9h 36m
English
Packt Publishing
Content preview from Mastering Reverse Engineering

How about an executable in its unpacked state?

Now that we have an executable file from Volatility, running this back in our Windows guest sandbox gives us the following message:

Remember that the packed executable has its own PE header and stub and not that of the original host's. The header, stub and compressed data were directly mapped to the process space. Every API function was dynamically imported. Even with the code and data decompressed, the entry point set in the header is still of the packed executables and not of the original hosts.  

Fortunately, x86dbg has a plugin known as Scylla. After reaching the original entry point, which ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reversing: Secrets of Reverse Engineering

Reversing: Secrets of Reverse Engineering

Eldad Eilam
Understanding the Linux Kernel, 3rd Edition

Understanding the Linux Kernel, 3rd Edition

Daniel P. Bovet, Marco Cesati

Publisher Resources

ISBN: 9781788838849Supplemental Content