Reverse Engineering Executables

No ratings

Presented at CarolinaCon 2014 by

An introduction to reverse engineering application executables to determine its purpose. This talk is geared for everyone. It shows how a simple program from source is constructed into intel assembly, then it shows how to examine the assembly to identify common components. Afterwards the audience can see that examining large programs with this method is complex and time consuming. The next topic is how to proceed using the industry term static analysis to identify key functional constructs. The executable usage of libraries to perform tasks are used to anticipate function. Lastly the industry term dynamic analysis is used to show how an executable can be run in a virtual machine environment to safely examine an executable at runtime. These techniques can help you understand how a program behaves and determine if the program is safe to run.