From 1a2a03e1c491b36265e1b70c3edf32e401029f3e Mon Sep 17 00:00:00 2001 From: Mia Steinkirch Date: Sun, 27 Oct 2019 20:55:15 -0700 Subject: [PATCH] =?UTF-8?q?=20=F0=9F=91=A8=F0=9F=8F=BD=20Clean=20up=20read?= =?UTF-8?q?me?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- Reverse_Engineering/README.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/Reverse_Engineering/README.md b/Reverse_Engineering/README.md index b3e5576..cbcdb4e 100644 --- a/Reverse_Engineering/README.md +++ b/Reverse_Engineering/README.md @@ -1,5 +1,7 @@ # Reverse Engineering + + * Objective: turn a x86 binary executable back into C source code. * Understand how the compiler turns C into assembly code. * Low-level OS structures and executable file format. @@ -329,6 +331,6 @@ xxd -r hello.dump > hello ---- -# Relevant Talks +# Talks -* [Patrick Wardle: Writing OS X Malware](https://vimeo.com/129435995) +* [Patrick Wardle: Writing OS X Malware](https://vimeo.com/129435995).