x86 Reverse Engineering Practice

I wanted to start focusing more on Reverse Engineering binaries after learning a good foundation from the OSCE course. I stumbled across this site Binary Auditing, which contains many compiled Windows executables. It also includes the free version of the IDA Pro disassembler. I will however be using a mix of Hopper & Binary Ninja as well.

This post will mainly be notes of going through the material:

Vulnerability Analysis 01: Warming Up the Stack (stack1)

Vulnerability Analysis 01: Warming Up the Stack (stack2)

Vulnerability Analysis 01: Warming Up the Stack (stack4)

Vulnerability Analysis 01: Warming Up the Stack (stack5)

Vulnerability Analysis 02: Advanced Buffer Overflow (abo1)



back