sec-pentesting-toolkit/Reverse_Engineering
2014-11-03 11:05:34 -05:00
..
2014-11-03 10:49:17 -05:00
2014-11-03 10:49:17 -05:00
2014-11-03 10:49:17 -05:00
2014-11-03 11:05:34 -05:00

Reverse Engineering


Tools

  • X86 Win32 Cheat sheet
  • Intro X86
  • base conversion
  • Command line tricks

Encondings/ Binaries

file f1
 
ltrace bin
 
strings f1
 
base64 -d
 
xxd -r

nm

objcopy

binutils

Online References


IDA


GDB

  • Commands and cheat sheet

gdb

$ gcc -ggdb -o <filename> <filename>.c

Starting with some commands:

$ gdb <program name> -x <command file>

For example:

$ cat command.txt
set disassembly-flavor intel
disas main

objdump

Display information from object files: Where object file can be an intermediate file created during compilation but before linking, or a fully linked executable

$ objdump -d  <bin>

hexdump & xxd

For canonical hex & ASCII view:

$hexdump -C 

xxd

Make a hexdump or do the reverse:

xxd hello > hello.dump
xxd -r hello.dump > hello