Exercise 1 Analyze the execution header. Check the first 15 lines of binaries from the file using xxd. In the first line, it can be seen that the magic byte of the ELF header starts with 0x7f. To understand what the following bytes mean, I used readelf command. The descriptions of each byte in the … Read More “Practical Binary Analysis chapter2 exercises” »
Category: Textbook
This textbook is a great starting point for reverse engineering. Actually I was studying another textbook for learning reverse engineering. However, that wasn’t easy to fully understand the contents since I lacked fundamental knowledge. So I searched for a beginner-level textbook and came across this book. It teaches you the basics of reverse engineering. Fundamentals … Read More “Review: X86-SOFTWARE-REVERSE-ENGINEERING-CRACKING-AND-COUNTER-MEASURES” »
This post is the second part of the post. strace, ltrace Let’s run the file again but this time providing a random string. Now a new reply appears on the screen. Let’s try with the string discovered. It still ends up with the error but it returns ok. We are getting there! It is able … Read More “Chapter 5 of Practical Binary Analysis Review 2” »
This post will explain the exercise from chapter 5 in the textbook “Practical Binary Analysis Build Your Own Linux Tools for Binary Instrumentation, analysis, and Disassembly (Andriesse, Dennis) “ The post will be divided into 2 parts. Many tools will be mentioned in this post. The textbook asks us to find a flag in the … Read More “Chapter 5 of Practical Binary Analysis Review 1” »