Penetration Testing: A Survival Guide
by Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran
Summary
Reverse engineering to get a definitive answer as to the actual code for a complicated application is unlikely, since there are many ways to achieve the same output from loops or choice structures. It is easier to get a statistical list of possible treatments of the inputs by testing several of them. You are likely to get more detail from looking at the assembly code outputs from EDB-Debugger, or OllyDbg. As you probably noticed, the assembly code for Linux and for Windows applications are basically identical. High-level languages like C and C++ are just ways to get at the assembly code that can be easily converted to machine code to tell the machine what to do.
Stresstesting your Windows hosts comes down to checking their ability to take ...