Calling Conventions For Reverse Engineering

แชร์
ฝัง
  • เผยแพร่เมื่อ 6 ส.ค. 2024
  • 🔥 Learn How Calling Conventions Work For Reverse Engineering & Game Hacking
    👨‍💻 Buy Our Courses: guidedhacking.com/register/
    💰 Donate on Patreon: / guidedhacking
    ❤️ Follow us on Social Media: linktr.ee/guidedhacking
    🔗 Learn More: guidedhacking.com/threads/cal...
    ❤️ Thank You to Malcore: link.malcore.io/redirect/guid...
    👨‍💻 Script & Visuals by rexir: guidedhacking.com/members/280...
    👩‍💻 Narration by wahsami: guidedhacking.com/members/wah...
    📜 Video Description:
    Today we're going to explore the low level world of calling conventions, which are essentially the guidelines that dictate how function arguments are passed. Understanding calling conventions is key to comprehending assembly code, especially when you're involved in reverse engineering tasks. It's important to recognize how the stack operates, growing and shrinking through various push and pop instructions. Remember, the stack is just one segment within a process's memory, with others like the heap, code, and data sections playing their pivotal roles.
    As a foundational concept, the function prologue sets the stage for a better comprehension of calling conventions. Think of the prologue as a routine that preps the system for the task ahead, ensuring that once the function is called, everything operates seamlessly. We'll also explore different calling conventions-cdecl, stdcall, and fastcall-each with its unique mechanism for managing arguments and maintaining system stability. Furthermore, learning about these conventions will illuminate the cleanup processes and the distinctions between caller and callee cleanups. Let's not forget our sponsor, Malcore.io, who has greatly simplified the process of scanning files for unknown threats with their innovative online malware analysis tools.
    📝 Timestamps:
    00:00 Intro to Calling Conventions
    00:16 Stack Mechanics
    01:16 Malcore Is Dank
    02:17 Function Prologue
    03:00 cdecl calling convention
    04:01 AddNum Example
    05:00 cdecl Cleanup
    05:30 stdcall
    06:01 FastCall Variants
    07:28 Microsoft FastCall
    07:47 thiscall Convention
    ✏️ Tags:
    #reverseengineering #gamehacking #malwareanalysis
    thiscall calling convention
    cdecl calling convention
    calling convention x64
    reverse engineering
    x64 calling convention
    x86 calling convention
    calling convention
    x86 calling conventions
    calling convention x86
    reverse engineering
    x86-64 calling convention
    c++ calling conventions
    c++ calling convention
    fastcall calling convention
    stdcall calling convention
    reverse engineering
    windows calling convention
    calling conventions
    function calling convention
    calling conventions c++
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น •