Chapter 9. CROSS-REFERENCES AND GRAPHING

CROSS-REFERENCES AND GRAPHING

Some of the more common questions asked while reverse engineering a binary are along the lines of, “Where is this function called from?” and “What functions access this data?” These and other similar questions seek to catalog the references to and from various resources in a program. Two examples serve to show the usefulness of these types of questions.

Consider the case in which you have located a function containing a stack-allocated buffer that can be overflowed, possibly leading to exploitation of the program. Since the function may be buried deep within a complex application, your next step might be to ...

Get The IDA Pro Book now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.