Introduction to Reverse Engineering

Asked 2 years ago, Updated 2 years ago, 31 views

About reverse engineering.
I'm sorry for the amateurish question, but I'll ask you a question separately.
Before that, I am interested in hacking, and I want to be able to debug any OS.
In other words, I want to be an expert enough to debug various software on Linux and Windows and modify network packets myself (I'm used to programming)

I know that you can at least get into basic knowledge.But
When studying reverse engineering, I am particular about understanding it deeply.
That's why I want to prepare the basics before I enter the school.
The curriculum I am thinking about now is assembly, win32 api, pefile mechanism, linuxapi, etc.
Will studying these things help reverse engineering and system hacking?
Also, please let me know if there is anything else useful.

I looked into the assembly and found that it was nasm, masm, 64-bit assembly
I'm confused because there are various assemblies, but
I want to debug from any OS.
What kind of assembler should I learn?

Are there any other contents of win64 api besides win32 api?
Do I need win64 api content when I debug 64-bit software?

c

2022-09-30 14:59

2 Answers

Cars don't usually run reverse, and I think reverse engineering is something you know about (forward) engineering.

A1.

I want to understand deeply just in case

If you don't understand "foot-to-foot engineering", it's meaningless.Without it, reverse engineering is 100 years early, to be honest.

A2. What kind of operating system does it include built-in uITRON? Does it include various microcomputers (RX/SH/ARM-Cortex/PIC, etc.)?

If you know the architecture, you can use any microcomputer in a short time (Oira is right, I guarantee you) and it doesn't taste good to use just one microcomputer.If you know why architecture is like that, you can apply it as much as you want.Assemblers are enough after that.

A3. If you are debugging at the assembly level, you know the ABI specification in that architecture.I don't need to ask.


2022-09-30 14:59

It won't take 100 years.

If you're a student, we're holding a IPA security camp.
I think it's a good opportunity to get a lot of knowledge.

In order to participate, you must answer Application assignment to participate, so
Why don't you study to understand the challenges here?

Some excerpts from the questions

B.7 Why do you need to know semiconductors and machine languages in the cybersecurity field?
 ■ Common Problem C
It is a question of looking at the power of the C language, which is the basis for implementing the OS.
- Create a bidirectional link list in C.1.C language and a function to manipulate it and submit the source code.
  It is sufficient to have three functions: generating link lists, inserting elements anywhere, and printing all elements in the standard output in order.
  If you're motivated, you can implement more features!
- C.2. Please describe your design and implementation ingenuity.
 ■ Common Problem 4 Select at least one item you have experience with Linux programming.
Have created command line applications using Python, Ruby, Perl, etc.
I have created a daemon that manages memory by itself using C/C++ etc.
Have used Procfs or system calls (libc system call wrappers) to create applications/daemons to retrieve and configure information in the kernel
Have you created a Linux Kernel Module/Linux Security Module?
Have you added or modified features to your Linux kernel?
Have you posted patches to your Linux kernel?

The questioner's programming field is familiar. I can't help but feel that there is a huge gap between the word and the basic knowledge required for reverse engineering and hacking.


2022-09-30 14:59

If you have any answers or tips


© 2024 OneMinuteCode. All rights reserved.