|
You are here |
usualsuspect.re | ||
| | | | |
www.jaybosamiya.com
|
|
| | | | | To either solve an RE challenge, or to be able to pwn it, one must first analyze the given binary, in order to be able to effectively exploit it. Since the binary might possibly be stripped etc (found using file) one must know where to begin analysis, to get a foothold to build up from. | |
| | | | |
www.codeproject.com
|
|
| | | | | For those who code | |
| | | | |
www.technovelty.org
|
|
| | | | | ||
| | | | |
goggleheadedhacker.com
|
|
| | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | ||