Загрузка...

Reverse Engineering Part 2: Static Analysis, Windows API Documentation

When you dump a binary and import it into GHIDRA or your disassembler of choice, you are presented with a disassembled psuedocode of the program. This is just a few tips in understanding the Windows API.

0:00-1:00 Using the Symbols Table to analyze API Calls
1:01-2:30 Example API Call. Naming formats of a API Function. Widechar Format versus ANSI format
2:31-4:40 Cross Reference Lookup Example
4:41 Windows API Programming Example

Видео Reverse Engineering Part 2: Static Analysis, Windows API Documentation канала Chang Tan
Страницу в закладки Мои закладки
Все заметки Новая заметка Страницу в заметки