CamSec - Basic Assembly for Reverse Engineering

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ต.ค. 2024
  • A talk from the CamSec meeting at The Centre for Computing History about the basics of Assembly Language required for reverse engineering.

ความคิดเห็น • 21

  • @MrChrisRP
    @MrChrisRP ปีที่แล้ว

    Excellent. This is the stuff "real" education is made of. Clear, concise and rockin'.

  • @lawrencedoliveiro9104
    @lawrencedoliveiro9104 7 ปีที่แล้ว +26

    9:34 you forgot to mention CF, the carry flag. This is just as important as SF. The difference is that SF reflects the result of signed operations, while CF reflects unsigned operations. At 16:13 you mention “above” and “below” jumps, which look at CF. You should also mention “greater” and “less-than” jumps, which look at SF.
    Confusion over signed versus unsigned integers is a frequent source of program bugs.

  • @Jajajajjajakakakakkakakakakak
    @Jajajajjajakakakakkakakakakak 6 ปีที่แล้ว +1

    It might also be worth mentioning that the RET instruction does not actually discard the values on the stack (as depicted) when the called function returns, these values still exist, we're just not concerned with them after we return

  • @PhilAlbu
    @PhilAlbu 4 ปีที่แล้ว +1

    Great lecture on assembly! Thank you so much for sharing :)
    Is there some way to download the slides? I could make them out half decent in the video, but it would be handy to have some for reference. Thanks!

  • @fuanka1724
    @fuanka1724 6 ปีที่แล้ว +6

    Can we get the slides from the presentation please? Couldn't really see much unfortunately.

    • @mohamedbassia
      @mohamedbassia 6 ปีที่แล้ว +7

      you can get it from here fr.slideshare.net/camsec/basic-asm?from_action=save

    • @9393jack
      @9393jack 5 ปีที่แล้ว +1

      @@mohamedbassia thank-you Mohamed

  • @deckard5pegasus673
    @deckard5pegasus673 ปีที่แล้ว

    the problem is with compiler optimizations you will probably never find a "proper function call"(the parameters placed on the stack), nor a proper "prologue" or "epilogue"(push ebp, move ebp,esp..), the compiler will store variables in all sorts of wierd places even way beyond the stack frame. Nor will you find the parameters nor the local variables neatly on the stack , etc..

  • @MrGeekGamer
    @MrGeekGamer 7 ปีที่แล้ว +3

    Very interesting. Any more videos coming on this?

    • @TheCentreforComputingHistory
      @TheCentreforComputingHistory  7 ปีที่แล้ว +5

      Yes, we'll be uploading more CamSec talks as they happen ... Subscribe to keep informed! :)

  • @enakui
    @enakui 2 ปีที่แล้ว

    Is there a place I can find this presentation pdf or ppt?

  • @bayram00
    @bayram00 3 ปีที่แล้ว +1

    great teacher

  • @icarus1656
    @icarus1656 3 ปีที่แล้ว +1

    this is awesome

  • @nikunjchapagain5654
    @nikunjchapagain5654 6 ปีที่แล้ว +2

    Is there another part to this? By the way this was awesome

  • @atharvparlikar8765
    @atharvparlikar8765 4 ปีที่แล้ว +3

    did that guy literally typed twatter instade of twitter

  • @adon2424
    @adon2424 5 ปีที่แล้ว +1

    good info, poor picture

  • @ciller98
    @ciller98 5 ปีที่แล้ว +1

    lul criminals hahah