https://www.youtube.com/results?search_query=reverse+engineering+tutorial (https://www.youtube.com/results?search_query=reverse+engineering+tutorial)
Google reverse engineering for beginners. Go Go gadget GOOOOOOOGGGGLLLLEEEEE
I meant: Do I need any particular knowledge before starting studying Reverse engineering?
I started studying reverse engineering a few days ago, I already know a bit of c#, c++ and the bases of other less known languages.
The problem is that I don't know where I should start...
I have read a few guides about reverse engineering, but I think I should study assembly before starting Reverse engineering. :-[
I hope
you can help me!
I wanna extract algorithms for key generation from known programs, so I think I should learn assembly before, am I right? Anyways thank you for the replies.
EDIT: Now I am trying to crack LaFarge #2 crackme, but it seems still too early...
Has anyone got a good Assembly and RE guide? At the moment I can't find anything good... I have already finished the ones that white-knight suggested me, but I think they were too easy even though they were really well explained.
[Sorry for any grammar error but I am not english]
Try to get hands on this book:
(https://dynamic.indigoimages.ca/books/1118787315.jpg?altimages=true&width=310&quality=85&maxheight=310&lang=en&z=100026988bc481945514ceb6a3e444d8a28be436d6c49-7)
- Art of Assembly Language, The - Hyde, Randall - Assembly Language Step-by-Step_ Programming with Linux - Duntemann, Jeff - Bug Hunter's Diary, A - Tobias Klein - Gray Hat Python_ Python Programming for Hackers and Reverse Engineers - Seitz, Justin - Guide to Kernel Exploitation_ Attacking the Core, A - Perla, Enrico & Oldani, Massimiliano - Hacking_ The Art of Exploitation_ The Art of Exploitation - Erickson, Jon - IDA Pro Book_ The Unofficial Guide to the World's Most Popular Disassembler, The - Eagle, Chris - Linux Malware Incident Response_ A Practitioner's Guide ile Data - Cameron Malin & Eoghan Casey & James Aquilina - Malware Forensics Field Guide for Windows Syst Field Guides - Casey, Eoghan;Malin, Cameron H - Practical Malware Analysis_ The Hands-On Guide to Dissecting Malicious Software - Sikorski, Michael & Honig, Andrew - Practical Reverse Engineering_ x86, x64, ARM, Windows Kernel, Rev Obfuscation - Dang, Bruce & Gazet, Alexandre & Bachaalany, Elias - Reversing_ Secrets of Reverse Engineering - Eilam, Eldad |
LegendofRandom's tutorials were great too, but his site has been down for weeks. I don't think this will change.I have downloaded his tutorials a few moths ago. You can get them in the attachment.
Thank you again for being really friendly and helpful. I think now I have enough books to study, I will read as much as possible.
I have a little problem with the first ReverseMe, When I start it in OllyDbg it says: Cannot find the entry point SendDlgitemMessageW the procedure in the dynamic link library C : \ Windows \ System32 \ ole32.dll
I have a little problem with the first ReverseMe, When I start it in OllyDbg it says: Cannot find the entry point SendDlgitemMessageW the procedure in the dynamic link library C : \ Windows \ System32 \ ole32.dll
You need to use Windows XP 32bit. I would recommend using a VM if you are not already doing so.Use SP2 or SP3, not SP1
I recommend studying code patterns and what they are translated into assembly. Then you can try tackling some crackmes.