This commit is contained in:
bt3gl 2014-11-19 12:26:51 -05:00
parent 6edad0739a
commit 984d5ca66a
7 changed files with 74 additions and 23 deletions

View file

@ -1,9 +1,7 @@
# Reverse Engineering
-------------
## Tools
## Tools Folder
- X86 Win32 Cheat sheet
- Intro X86
@ -11,7 +9,26 @@
- Command line tricks
### Encondings/ Binaries
## Other Tools
- gdb
- IDA Pro
- Immunity Debugger
- OllyDbg
- Radare2
- nm
- objdump
- strace
- ILSpy (.NET)
- JD-GUI (Java)
- FFDec (Flash)
- dex2jar (Android)
- uncompyle2 (Python)
- unpackers, hex editors, compilers
## Encondings/ Binaries
```
file f1
@ -35,29 +52,25 @@ binutils
### Online References
## Online References
[Reverse Engineering, the Book]: http://beginners.re/
----
## IDA
- Cheat sheet
- [IDA PRO](https://www.hex-rays.com/products/ida/support/download_freeware.shtml)
-------------
## GDB
## gdb
- Commands and cheat sheet
#### gdb
```sh
$ gcc -ggdb -o <filename> <filename>.c
@ -76,7 +89,7 @@ disas main
```
#### objdump
## objdump
Display information from object files: Where object file can be an intermediate file
created during compilation but before linking, or a fully linked executable
@ -85,14 +98,14 @@ created during compilation but before linking, or a fully linked executable
$ objdump -d <bin>
```
#### hexdump & xxd
## hexdump & xxd
For canonical hex & ASCII view:
```
$hexdump -C
```
#### xxd
## xxd
Make a hexdump or do the reverse:
```
xxd hello > hello.dump