sec-pentesting-toolkit/Reverse_Engineering
2014-11-19 12:26:51 -05:00
..
2014-11-03 10:49:17 -05:00
2014-11-03 10:49:17 -05:00
2014-11-14 15:44:23 -05:00
2014-11-03 10:49:17 -05:00
2014-11-19 12:26:51 -05:00

Reverse Engineering

Tools Folder

  • X86 Win32 Cheat sheet
  • Intro X86
  • base conversion
  • Command line tricks

Other Tools

  • gdb
  • IDA Pro
  • Immunity Debugger
  • OllyDbg
  • Radare2
  • nm
  • objdump
  • strace
  • ILSpy (.NET)
  • JD-GUI (Java)
  • FFDec (Flash)
  • dex2jar (Android)
  • uncompyle2 (Python)
  • unpackers, hex editors, compilers

Encondings/ Binaries

file f1
 
ltrace bin
 
strings f1
 
base64 -d
 
xxd -r

nm

objcopy

binutils

Online References

IDA

gdb

  • Commands and cheat sheet
$ gcc -ggdb -o <filename> <filename>.c

Starting with some commands:

$ gdb <program name> -x <command file>

For example:

$ cat command.txt
set disassembly-flavor intel
disas main

objdump

Display information from object files: Where object file can be an intermediate file created during compilation but before linking, or a fully linked executable

$ objdump -d  <bin>

hexdump & xxd

For canonical hex & ASCII view:

$hexdump -C 

xxd

Make a hexdump or do the reverse:

xxd hello > hello.dump
xxd -r hello.dump > hello