Reverse Engineering Part 2: Static Analysis, Windows API Documentation
When you dump a binary and import it into GHIDRA or your disassembler of choice, you are presented with a disassembled psuedocode of the program. This is just a few tips in understanding the Windows API.
0:00-1:00 Using the Symbols Table to analyze API Calls
1:01-2:30 Example API Call. Naming formats of a API Function. Widechar Format versus ANSI format
2:31-4:40 Cross Reference Lookup Example
4:41 Windows API Programming Example
Видео Reverse Engineering Part 2: Static Analysis, Windows API Documentation канала Chang Tan
0:00-1:00 Using the Symbols Table to analyze API Calls
1:01-2:30 Example API Call. Naming formats of a API Function. Widechar Format versus ANSI format
2:31-4:40 Cross Reference Lookup Example
4:41 Windows API Programming Example
Видео Reverse Engineering Part 2: Static Analysis, Windows API Documentation канала Chang Tan
Комментарии отсутствуют
Информация о видео
31 июля 2024 г. 12:34:04
00:06:56
Другие видео канала