Reverse Engineering 3: Assembly Part 2
by Jason An
We'll be continuing our dive into x86 assembly this week. We'll finish the slides we didn't cover last week, and then move onto learning about how memory works.
Slides
Challenges
A set of challenges with increasing difficulty are deployed to platform.acmcyber.com to practice the concepts covered in the slides. You can filter for them on the platform by checking "rev" under "Categories", and "week 3" under "week". They are:
rev/bomb2
rev/bobomb
rev/jabeglnz
rev/galfrekcehc
Resources
The following resources are great tools for some of the reversing challenges:
- objdump command: A command that lets you disassemble an executable to extract the assembly
- x86 reference: An HTML rendering of the Intel handbook containing details on every x86 instruction