What you’ll learn
- The theory behind disassembly and its role in reverse engineering.
- The four stages of binary analysis: Preprocessing, Compilation, Assembly, and Linking.
- The compilation process breakdown and the purpose of each phase.
- Working with symbolic information in stripped and not stripped binaries.
- How binary executables load and execute.
- Installation and basics of Ghidra, a tool for reverse engineering.
- Installing the Java Development Kit (JDK) for Ghidra.
- Navigating and utilizing Ghidra for project analysis.
- Real-world malware analysis using Ghidra.
- Practical reverse engineering skills through hands-on malware analysis.
- Writing a 64-bit assembly program to display “Hello, world!” using a makefile.
- Installing and setting up the SASM assembler for assembly programming.
- Understanding the superiority of NASM (Netwide Assembler) and comparing it with other assemblers.
- Creating a basic “Hello, world!” program in assembly without using a makefile.
- Exploring the theory of disassembly and disassemblers in reverse engineering.
- Analyzing the fundamentals of disassembly and its importance in reverse engineering.
- Delving into various data types and their representation in assembly language.
- Understanding CPU architectures, binary files, and their relationship.
- etc......