Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

TryHackMe

Windows Reversing Intro

via TryHackMe

Overview

This room is part of a series of rooms that will introduce you to reverse engineering software on Windows. This is going to be a fairly short and easy room in which you will be introduced to how higher-level concepts look at a lower level. You will also start to get familiar with IDA. We will use the skills learned here to perform more advanced reverse engineering techniques in future rooms.

The programs provided in this room are compiled with MSVC (C++ compiler built-in with Visual Studio) set to release mode for x64. Debug binaries and symbols will not be used to teach with, however, debug symbols will be provided for those who are curious. This is done to make everything as realistic as possible. Debug symbols are a luxury when reverse engineering, and aren't common when dealing with executables.

Syllabus

  1. Intro Room Overview
  2. Intro IDA Overview
  3. Explanation Function Prologue/Epilogue
  4. Analysis Function Call Sample
  5. Analysis Loop Sample
  6. Explanation Structures
  7. Explanation DLL
  8. Conclusion

Taught by

Z0F

Reviews

Start your review of Windows Reversing Intro

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.