Skip to Main Content
Mastering Reverse Engineering
book

Mastering Reverse Engineering

by Reginald Wong
October 2018
Beginner to intermediate content levelBeginner to intermediate
436 pages
9h 36m
English
Packt Publishing
Content preview from Mastering Reverse Engineering

Dynamic analysis with debugging

There is nothing better than verifying what we assumed during our static analysis. Simply running the program and entering the password should finish the job:

Deadlisting is as important as debugging a program. Both can be done at the same time. Debugging can help speed up the deadlisting process as it is also validated at the same time. For this exercise, we're going to redo the analysis of passcode.exe by using x32dbg from https://x64dbg.com

After opening passcode.exe in x32dbg, registering EIP will be at a high memory region. This is definitely not in any part of the passcode.exe image:

To go around this, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reversing: Secrets of Reverse Engineering

Reversing: Secrets of Reverse Engineering

Eldad Eilam
Understanding the Linux Kernel, 3rd Edition

Understanding the Linux Kernel, 3rd Edition

Daniel P. Bovet, Marco Cesati

Publisher Resources

ISBN: 9781788838849Supplemental Content