Reverse Engineering Executable | Disassembly of executable code | Compilation process in C

preview_player
Показать описание
Reverse engineering of executables is performed through the process known as disassembly of executable code. Reverse engineering and the process of compilation are of of prime that a good programmer should be aware of. Especially, disassembly of an executable is a key to understanding the process of reverse engineering in situation where the source code has been lost. Reverse Engineering is an emulation of how the compilers actually implements high level statements into machine code and is to discover the logic behind an application whose source code has been lost or any other reason.

This video talks about the compilation process of the C compiler that translates a high-level language into an object file that is almost a complete image of the executable. The linker links the symbols present in the object file to precompiled libraries.

Though you can write your code in a high-level language, however, the compiler gives you an option to generate an assembly code just above the machine language encoding that is very tedious to understand. Then there is another utility, the assembler, that actually generates the output file. The video describes the relationship of the object file with the disassembled version of an executable generated using either the GDB or OBJDUMP utilities.
Рекомендации по теме
Комментарии
Автор

How can we upgrade any reference that present in a .dll exe

irtassamArshad
Автор

Sir, please guide me about if there are no aggregate types i.e arrays so how we can store data as we did in C language? and please guide me about the concept of signed and unsigned here.
JazakALLAH

muhammadzeeshanrajpoot