TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Reverse engineering course

656 pointsby Edouar1over 5 years ago

22 comments

lynxjermover 5 years ago
RPISEC RE&#x2F;VR courses (a little scattered due to the passage of time):<p>Secure Software Principles - CSCI 4971, Spring 2010:<p><a href="http:&#x2F;&#x2F;www.cs.rpi.edu&#x2F;academics&#x2F;courses&#x2F;spring10&#x2F;csci4971&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.cs.rpi.edu&#x2F;academics&#x2F;courses&#x2F;spring10&#x2F;csci4971&#x2F;</a><p>Malware Analysis - CSCI 4972&#x2F;6963, Spring 2013:<p><a href="http:&#x2F;&#x2F;security.cs.rpi.edu&#x2F;courses&#x2F;malware-spring2013&#x2F;" rel="nofollow">http:&#x2F;&#x2F;security.cs.rpi.edu&#x2F;courses&#x2F;malware-spring2013&#x2F;</a><p>Advanced Exploitation and Rootkit Development, Spring 2013:<p><a href="http:&#x2F;&#x2F;security.cs.rpi.edu&#x2F;~candej2&#x2F;" rel="nofollow">http:&#x2F;&#x2F;security.cs.rpi.edu&#x2F;~candej2&#x2F;</a><p>Program Obfuscation, Fall 2013:<p><a href="http:&#x2F;&#x2F;security.cs.rpi.edu&#x2F;courses&#x2F;obfuscation-fall2013&#x2F;syllabus.pdf" rel="nofollow">http:&#x2F;&#x2F;security.cs.rpi.edu&#x2F;courses&#x2F;obfuscation-fall2013&#x2F;syll...</a><p>Windows Exploitation, Spring 2014:<p><a href="http:&#x2F;&#x2F;security.cs.rpi.edu&#x2F;~gaasem&#x2F;winexp&#x2F;IndependentStudy.pdf" rel="nofollow">http:&#x2F;&#x2F;security.cs.rpi.edu&#x2F;~gaasem&#x2F;winexp&#x2F;IndependentStudy.p...</a><p><a href="http:&#x2F;&#x2F;gaasedelen.blogspot.com&#x2F;2014&#x2F;02&#x2F;windows-exploitation-smashing-stacks.html?q=independent+study" rel="nofollow">http:&#x2F;&#x2F;gaasedelen.blogspot.com&#x2F;2014&#x2F;02&#x2F;windows-exploitation-...</a><p>Modern Binary Exploitation - CSCI 4968, Spring 2015:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;RPISEC&#x2F;MBE" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;RPISEC&#x2F;MBE</a><p>Malware Analysis - CSCI 4976, Fall 2015:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;RPISEC&#x2F;Malware" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;RPISEC&#x2F;Malware</a>
评论 #22065006 未加载
评论 #22068702 未加载
评论 #22066560 未加载
sepen77over 5 years ago
I&#x27;ll admit I haven&#x27;t had the chance to look through it at all yet.. in fact, I&#x27;m typing this comment just I took a glance at the table of contents. It&#x27;s a small thing, but it kind of irks me that &quot;Final Notes&quot; following &quot;0x509 ImplementingPlayer&quot; is indexed as 0x510 rather than 0x50a<p>Anyway, I&#x27;m going to save this for later viewing.. very interesting post.
ravenstineover 5 years ago
Always thought reversing is fun. Back in high school and college I would spend days or weeks trying to reverse random software packages I had installed on my system. It was pretty surprising how, with a few tools like OllyDBG, 90% of the software I attempted to crack was actually crackable. Most of Autodesk&#x27;s software was ridiculously easy to crack. (Don&#x27;t worry, I owned all that software already! I was studying animation at the time.)<p>I didn&#x27;t realize this until later, but I got a skill out of reversing that&#x27;s actually pretty useful as a software engineer. Granted, I work with JavaScript, but reversing actually taught me how to persevere with debugging. I&#x27;ve been able to fix some bugs that other people couldn&#x27;t in a reasonable timeframe because I treated the problem like I would when reversing a program; it can be more expedient to perform a process of elimination by disabling or inverting parts of the code, observing what happens, keeping detailed notes on observed behavior, and lead yourself down to the key change you need to make. A lot of people debug problems by trying to look at the code and reason about it while setting breakpoints, but there can be a lot of mental overhead in doing this. When the problem is mysterious, I find that a process of elimination through experimentation can be more effective.<p>This actually happened recently, where we essentially had an infinite feedback look happening that was obfuscated by a lot of framework code. It&#x27;s possible that the root cause could have been identified by debugging, but a few people tried to do so but couldn&#x27;t figure it out. This is because setting a breakpoint somewhere in the process chain didn&#x27;t reveal anything obvious, and you&#x27;d be lucky to actually spot the problem in the application code just by looking at it. I treated the problem like reverse engineering, and did exactly what I described above. It took me a few hours, but I did succeed in narrowing down exactly where in the code things were going wrong.<p>Sure, someone could have stepped through the app and framework code enough times that they might have figured it out. Perhaps there are also more advanced debugging techniques that none of us were aware of that would have helped. But the mindset of a reverser definitely works.
评论 #22066438 未加载
评论 #22080005 未加载
userbinatorover 5 years ago
It seems the majority of RE-related stuff these days focuses on malware but the skills are very useful for other things, particularly debugging in general. I didn&#x27;t specifically learn RE, but since I started long ago with Asm, I guess it came naturally. You can tell the author of this one probably comes from an HLL background because of the &quot;0x&quot; prefixes; those with an Asm background are more likely to use a &quot;h&quot; suffix instead.<p>For Windows debuggers I recommend Windbg, which is free and comes from Microsoft. Using VS for Asm-level debugging is only mildly better than using gdb for it --- i.e. very awkward and not what they were designed for.
评论 #22064247 未加载
undershirtover 5 years ago
I used to dabble in Cheat Engine, Tsearch, and IDA Pro, for reversing games. Recently, a nice guy randomly showed me a demo of a modern tool called radare[1]. I was floored by the IDA-like flow-diagrams that it spit out in the terminal[2], and the short commands for navigating&#x2F;bookmarking&#x2F;documenting. Nice to see hobbyists don&#x27;t need to buy IDA anymore!<p>[1]:<a href="https:&#x2F;&#x2F;www.radare.org&#x2F;r&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.radare.org&#x2F;r&#x2F;</a><p>[2]:<a href="https:&#x2F;&#x2F;www.radare.org&#x2F;r&#x2F;img&#x2F;r2cg.png" rel="nofollow">https:&#x2F;&#x2F;www.radare.org&#x2F;r&#x2F;img&#x2F;r2cg.png</a>
评论 #22068377 未加载
评论 #22072233 未加载
mikorymover 5 years ago
There is a useful IRC channel on freenode called ##re, for those who might care.
rollulusover 5 years ago
This title made me feel nostalgic, and search for +ORC [1] and +Fravia [2].<p>[1]: <a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Old_Red_Cracker" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Old_Red_Cracker</a> [2]: <a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Fravia" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Fravia</a>
评论 #22064681 未加载
评论 #22064742 未加载
jgtroshover 5 years ago
&gt; If 0x12345678 was loaded into a 64 bit register such as RAX, then RAX refers to 0x12345678, EAX refers to 0x5678, AX refers to 0x78, AH refers to 0x7, AL refers to 0x8.<p>I made a PR to correct this example which equated single hexadecimal digits with whole bytes.<p>Other than that what I read of the course is rather nice, targeted at a mostly beginner audience with some correct insight.<p>There also some weird insight:<p>&gt; You can think of computers as trains, they don&#x27;t stop and only go in a very specific and direct path as designated by the tracks. If there&#x27;s a child on the tracks it&#x27;s up to the people controlling the track to divert the train. This is why Windows gives you the Blue Screen of Death (BSOD) when there is a kernel error. If the OS doesn&#x27;t stop that error, catastrophic damage could occur.<p>This isn&#x27;t really wrong, it&#x27;s just a non-obvious metaphor formulated strangely in my opinion. A BSOD would be more akin to the fully automated train just blowing up in sight of the children or something? It&#x27;s weird.
评论 #22065592 未加载
e19293001over 5 years ago
I started with these series of tutorials:<p><a href="https:&#x2F;&#x2F;tuts4you.com&#x2F;e107_plugins&#x2F;download&#x2F;download.php?list.17=" rel="nofollow">https:&#x2F;&#x2F;tuts4you.com&#x2F;e107_plugins&#x2F;download&#x2F;download.php?list...</a><p>Purely hands-on. Old school. Use virtual box.
melvinroestover 5 years ago
Hmm, I&#x27;ve been itching to dive into some security thing again (I&#x27;m getting into the habit to dedicate 1 to 2 months per year for it, this would be year 4). This person&#x27;s effort seems so awesome and genuine that I&#x27;m up for helping out.<p>Though, I don&#x27;t want to study it <i>completely</i> by myself, it gets a bit lonely and there&#x27;s no accountability. Does anyone want to set up a study group with me?<p>My background: I know how to reverse Linux binaries, albeit I&#x27;m a bit rusty. I followed a course called binary and malware analysis at the Vrije Universiteit Amsterdam, and two other related security courses (shout out to Herbert Bos and his team for giving such an awesome course).<p>My email is in my profile.
评论 #22066327 未加载
评论 #22062757 未加载
评论 #22062953 未加载
评论 #22063145 未加载
nubbinsover 5 years ago
I enjoy the little nuggets of wisdom like:<p>&gt;Learning your first calling convention is like learning your first programming language. It seems complex and daunting at first, but it&#x27;s really quite simple.<p>I will definitely read this as I&#x27;m also doing the Reverse Engineering for beginners, as well as getting sidetracked to learn Assembly with Programming From the Ground Up first.
generikover 5 years ago
BCI teaches some hands on courses in Boston if you like to travel. <a href="https:&#x2F;&#x2F;www.eventbrite.com&#x2F;o&#x2F;boston-cybernetics-institute-18410690984" rel="nofollow">https:&#x2F;&#x2F;www.eventbrite.com&#x2F;o&#x2F;boston-cybernetics-institute-18...</a>
DonHopkinsover 5 years ago
Will Wright defined the &quot;Simulator Effect&quot; as how game players imagine a simulation is vastly more detailed, deep, rich, and complex than it actually is: a magical misunderstanding that you shouldn’t talk them out of. He designs games to run on two computers at once: the electronic one on the player’s desk, running his shallow tame simulation, and the biological one in the player’s head, running their deep wild imagination.<p>&quot;Reverse Over-Engineering&quot; is a desirable outcome of the Simulator Effect: what game players (and game developers trying to clone the game) do when they use their imagination to extrapolate how a game works, and totally overestimate how much work and modeling the simulator is actually doing, because they filled in the gaps with their imagination and preconceptions and assumptions, instead of realizing how many simplifications and shortcuts and illusions it actually used.<p><a href="https:&#x2F;&#x2F;www.masterclass.com&#x2F;classes&#x2F;will-wright-teaches-game-design-and-theory&#x2F;chapters&#x2F;game-mechanics#reviews" rel="nofollow">https:&#x2F;&#x2F;www.masterclass.com&#x2F;classes&#x2F;will-wright-teaches-game...</a><p>&gt;There&#x27;s a name for what Wright calls &quot;the simulator effect&quot; in the video: apophenia. There&#x27;s a good GDC video on YouTube where Tynan Sylvester (the creator of RimWorld) talks about using this effect in game design.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Apophenia" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Apophenia</a><p>&gt;Apophenia (&#x2F;æpoʊˈfiːniə&#x2F;) is the tendency to mistakenly perceive connections and meaning between unrelated things. The term (German: Apophänie) was coined by psychiatrist Klaus Conrad in his 1958 publication on the beginning stages of schizophrenia. He defined it as &quot;unmotivated seeing of connections [accompanied by] a specific feeling of abnormal meaningfulness&quot;. He described the early stages of delusional thought as self-referential, over-interpretations of actual sensory perceptions, as opposed to hallucinations.<p>RimWorld: Contrarian, Ridiculous, and Impossible Game Design Methods<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=VdqhHKjepiE" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=VdqhHKjepiE</a><p>5 game design tips from Sims creator Will Wright<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=scS3f_YSYO0" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=scS3f_YSYO0</a><p>&gt;Tip 5: On world building. As you know by now, Will&#x27;s approach to creating games is all about building a coherent and compelling player experience. His games are comprised of layered systems that engage players creatively, and lead to personalized, some times unexpected outcomes. In these types of games, players will often assume that the underlying system is smarter than it actually is. This happens because there&#x27;s a strong mental model in place, guiding the game design, and enhancing the player&#x27;s ability to imagine a coherent context that explains all the myriad details and dynamics happening within that game experience.<p>&gt;Now let&#x27;s apply this to your project: What mental model are you building, and what story are you causing to unfold between your player&#x27;s ears? And how does the feature set in your game or product support that story? Once you start approaching your product design that way, you&#x27;ll be set up to get your customers to buy into the microworld that you&#x27;re building, and start to imagine that it&#x27;s richer and more detailed than it actually is.
评论 #22062945 未加载
unlit_sparkover 5 years ago
This is good, keep up the good work. Also, from the creator:<p>&gt;I&#x27;m working on adding more content, more detail, more examples, and really just more everything. Please give me any and all feedback, I&#x27;ve already followed some advice given in the comments on this post. It&#x27;s really appreciated
wensleyover 5 years ago
How would you get started reverse engineering an old PS1 game? Say you wanted to try and extract the model data or textures and the disc contains only 3 or 4 files, what&#x27;s the starting point?
tjpnzover 5 years ago
I really like the sections on assembly. They&#x27;re well written and a pretty good introduction or refresher. There&#x27;s plenty out there on the subject but few that are as approachable.
rkagererover 5 years ago
Would love to see this pop up again once it&#x27;s more fleshed out.
matt_the_bassover 5 years ago
Seems like this should be titled “reverse engineering software products course”.<p>Mechanical RE is equally important for many applications as well.
mrsaintover 5 years ago
Does anyone remember SoftIce here? 🧓
评论 #22066510 未加载
heavyset_goover 5 years ago
Anyone have links to similar resources, but for Linux instead of Windows?
评论 #22074050 未加载
mamouriover 5 years ago
This is excellent. Does anyone know a similar resource for Mac or Linux?
评论 #22062077 未加载
captn3m0over 5 years ago
Anyone has suggestions for iOS&#x2F;Android reverse engineering?