tysm, i wanted to learn assembly for a while now and I did try on the past but gave up because i didn't find any resources (or didn't search enough :P) and thanks to this I can now actually write and read some basic assembly, I know it takes a very long time to make these videos but I hope you make more, subbed :)
Stack segment: last in first out, pointer is moving, data is going lost after popping the last value from the stack, used by calling convention Data segment: pointer to memory location, no data get lost, read/write access from inside and outside nested sub routines without to care where the stack pointer is
One byte of 8 bits can divided into = 4 bits high nibble + 4 bits low nibble. And this make it easy to read some bits as hexadecimal values without to know the decimal value of the byte. 4 bits hexadecimal 0000 = 0 0001 = 1 0010 = 2 0011 = 3 0100 = 4 0101 = 5 0110 = 6 0111 = 7 1000 = 8 1001 = 9 1010 = A 1011 = B 1100 = C 1101 = D 1110 = E 1111 = F
I like to use the DosBox emulator for using the x86 assembly programming language, because DosBox emulates a PC with MS DOS 5 and in DOS there is no protection to access all hardware components directly without to get a message of a protection violation. In Windows/Linux we have to use system calls to use the hardware, but not in DOS. In DOS we can controll the hardware directly with our own executable, if we know how to do it. So in DOS we have a lot more to learn how the hardware components work together. It starts by writing directly into the screen memory and go through the point to switch the working mode of the CPU.
hope you take us along with you through your path of learning assembly i recently saw a video on off by one security about process injection and there was a lot of assembly in it as they open the code in gidra to see the break point and all to inject a malicious code onto a legitimate process for process hollowing i didnt understand much as i ddint know how the assembly works and how he found the break point and all
I am on an Android tablet with a Dosbox emulator app installed and i like to use x86 assembly to create tiny executable with a little help from debug. I am not familar with an ARM CPU, but the emulation of intel 80386/80387 works fine.
On Windows i used the DosBox emulator to mount a folder as a drive. And inside the emulation i can read/write all files in this folder, but not the files of the host system.
Imagine with 32 bit we can make an executable that start with decimal values attached for input with up to ten ASCII 4294967295 to convert it to 8 hexadecimal ASCII FFFFFFFF for output.
Thank you! Please continue with this assembly tutorials 👏👏
OMG thank you so much! this will be really helpful for me I really appreciate that!
Thanks, comments like this are super motivating
tysm, i wanted to learn assembly for a while now and I did try on the past but gave up because i didn't find any resources (or didn't search enough :P) and thanks to this I can now actually write and read some basic assembly, I know it takes a very long time to make these videos but I hope you make more, subbed :)
Search for intel developer manual for 80386.
Stack segment: last in first out, pointer is moving, data is going lost after popping the last value from the stack, used by calling convention
Data segment: pointer to memory location, no data get lost, read/write access from inside and outside nested sub routines without to care where the stack pointer is
One byte of 8 bits can divided into = 4 bits high nibble + 4 bits low nibble. And this make it easy to read some bits as hexadecimal values without to know the decimal value of the byte.
4 bits hexadecimal
0000 = 0
0001 = 1
0010 = 2
0011 = 3
0100 = 4
0101 = 5
0110 = 6
0111 = 7
1000 = 8
1001 = 9
1010 = A
1011 = B
1100 = C
1101 = D
1110 = E
1111 = F
Hope this will be a multiple part series ‼️
this guy is getting better and better with each video - incredible to see 🍿. keep up the good work 👾
Wow! Very well done! I'm loving it!
Nice I hope you have next episodes about assembly 😍😍
I like to use the DosBox emulator for using the x86 assembly programming language, because DosBox emulates a PC with MS DOS 5 and in DOS there is no protection to access all hardware components directly without to get a message of a protection violation. In Windows/Linux we have to use system calls to use the hardware, but not in DOS. In DOS we can controll the hardware directly with our own executable, if we know how to do it. So in DOS we have a lot more to learn how the hardware components work together. It starts by writing directly into the screen memory and go through the point to switch the working mode of the CPU.
hope you take us along with you through your path of learning assembly i recently saw a video on off by one security about process injection and there was a lot of assembly in it as they open the code in gidra to see the break point and all to inject a malicious code onto a legitimate process for process hollowing i didnt understand much as i ddint know how the assembly works and how he found the break point and all
I am on an Android tablet with a Dosbox emulator app installed and i like to use x86 assembly to create tiny executable with a little help from debug. I am not familar with an ARM CPU, but the emulation of intel 80386/80387 works fine.
mov eax, 5
shl eax, 3 ; = shift left 3 times
shl 1 time = multiply by 2....shl 2 times = multiply by 4.......shl 3 times = multiply by 8
Which extension you're using for the syntax highlighting?
Please continue sir please
Love it.
Good work.
Thank you ...
how do I setup VS 2022 for assembly?
can you make tutorial in nasm
Love you
The keyword colouring should be adjusted for dark mode. Other than that good video, thanks
I know, but i couldn't find any other good syntax highlighter
@@screeck perhaps there is a json or config file located somewhere, you don't need to change whole highlighter
suggestion: dont play with assembly, you're gonna $uck your system, at least do it within sandboxed envs
On Windows i used the DosBox emulator to mount a folder as a drive. And inside the emulation i can read/write all files in this folder, but not the files of the host system.
Imagine with 32 bit we can make an executable that start with decimal values attached for input with up to ten ASCII 4294967295 to convert it to 8 hexadecimal ASCII FFFFFFFF for output.