https://tantemalkah.at/2025/ethical-hacking
🌒⇆🌖 Use page style to switch to light mode.Speziell bezogen auf Software wird darunter meistens einer der drei folgenden Vorgänge verstanden:Source: Wikipedia [DE]: Reverse Engineering (2025-06-11)
- Die Rückgewinnung des Quellcodes oder einer vergleichbaren Beschreibung aus Maschinencode, z. B. von einem ausführbaren Programm oder einer Programmbibliothek, etwa mit einem Disassembler (kann Teil eines Debuggers sein) oder einem Decompiler.
- Die Erschließung der Regeln eines Kommunikationsprotokolls aus der Beobachtung der Kommunikation, z. B. mit einem Sniffer.
- Die nachträgliche Erstellung eines Modells, ausgehend von bereits vorliegendem Quellcode, in der objektorientierten Programmierung.
Lexi Mattick: Putting the “You” in CPU
For a funny take on assembler play the Human Resource Machine.
Gustavo Dutarte: Anatomy of a Program in Memory (meanwhile an oldie-but-goldie)
reverse engineering is usually something that requires a steady build-up of experience. it isn't something we just quickly do on the side, at least not when we want to reverse binary executables.
for a quick start, here is a guide on how to start with your first reversing challenges: Part : 1 [crackmes.one] — Beginner Friendly Reversing Challenges
https://crackmes.one is a playground similar to hackthebox,
but specifically for reverse engineering
Computerphile: Running a Buffer Overflow Attack (YouTube, 17min)
Tutorial/Gist based on the above video:
https://gist.github.com/apolloclark/6cffb33f179cc9162d0a
Daniel Slater How to exploit a buffer overflow vulnerability - Practical (YouTube, 10min)
strncpy
instead of strcpy
etc.gets
because it is quick and convenient (was replaced in C11 with safer get_s)
Compile and debug this inside you Kali box. You need to turn off ASLR. See the comments in the file.
We would not want to do this on our host system.
For show-off effects, change the executable's ownership to root and set the suid bit.