Reverse Engineering 3: Assembly Part 2

by Jason An

We'll be continuing our dive into x86 assembly this week. We'll finish the slides we didn't cover last week, and then move onto learning about how memory works.

Slides

Challenges

A set of challenges with increasing difficulty are deployed to platform.acmcyber.com to practice the concepts covered in the slides. You can filter for them on the platform by checking "rev" under "Categories", and "week 3" under "week". They are:

  • rev/bomb2
  • rev/bobomb
  • rev/jabeglnz
  • rev/galfrekcehc

Resources

The following resources are great tools for some of the reversing challenges:

  • objdump command: A command that lets you disassemble an executable to extract the assembly
  • x86 reference: An HTML rendering of the Intel handbook containing details on every x86 instruction