News
Welcome to NeoRHDN! This place is still a work-in-progress, so pardon the construction...

Site registration now fixed. Oops!
Views: 435,288
Sections: Documents | Utilities | ROM Hacks | Games | Translations | Homebrew | Fonts
Site: Main | Rules/FAQ | Discord | Memberlist | Latest posts | Stats | Ranks | Online users
09-20-24 04:35 AM
Guest: Register | Login

NeoRHDN - Documents - Document Information

Introduction to Reverse Engineering WIN32 Applications
Assembly
TitleIntroduction to Reverse Engineering WIN32 Applications
Description
This paper will introduced the reader to many concepts and tools essential to understanding and controlling native WIN32 applications through the eyes of Windows Debugger (WinDBG). Throughout, WinMine will be utilized as a vehicle to deliver and demonstrate the functionality provided by WinDBG and how this functionality can be harnessed to aid the reader in reverse engineering native WIN32 applications. Topics covered include an introductory look at IA-32 assembly, register significance, memory protection, stack usage, various WinDBG commands, call stacks, endianness, and portions of the Windows API. Knowledge gleaned will be used to develop an application designed to reveal and/or remove bombs from the WinMine playing grid.
Authortrew
CategoryAssembly
PlatformPC
GameN/A
LevelBeginner
Version1.0
Release Date$2007-10-01
Downloads494
Last Modified2017-10-24 02:06:29

Download


Acmlmboard v2.5.6+neo (2024-08-13)
© 2005-2024 Acmlm, Emuz, NinCollin, et al.

Page rendered in 0.010 seconds. (637KB of memory used)
MySQL - queries: 24, rows: 323/330, time: 0.008 seconds.