# Reverse Engineering ------------- ## Tools - X86 Win32 Cheat sheet - Intro X86 - base conversion - Command line tricks ### Encondings/ Binaries ``` file f1 ltrace bin strings f1 base64 -d xxd -r nm objcopy binutils ``` ### Online References [Reverse Engineering, the Book]: http://beginners.re/ ---- ## IDA - Cheat sheet - [IDA PRO](https://www.hex-rays.com/products/ida/support/download_freeware.shtml) ------------- ## GDB - Commands and cheat sheet #### gdb ```sh $ gcc -ggdb -o .c ``` Starting with some commands: ```sh $ gdb -x ``` For example: ```sh $ cat command.txt set disassembly-flavor intel disas main ``` #### objdump Display information from object files: Where object file can be an intermediate file created during compilation but before linking, or a fully linked executable ```sh $ objdump -d ``` #### hexdump & xxd For canonical hex & ASCII view: ``` $hexdump -C ``` #### xxd Make a hexdump or do the reverse: ``` xxd hello > hello.dump xxd -r hello.dump > hello ```