Reverse Engineering: Difference between revisions
Jump to navigation
Jump to search
CelesteBlue (talk | contribs) No edit summary |
|||
Line 27: | Line 27: | ||
*https://tacnetsol.wistia.com/projects/9srmkf6e02 Hardware Reverse Engineering | *https://tacnetsol.wistia.com/projects/9srmkf6e02 Hardware Reverse Engineering | ||
*http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/ identifying and reverse engineering embedded serial ports | *https://web.archive.org/web/20190319221524/http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/ identifying and reverse engineering embedded serial ports | ||
{{Reverse Engineering}} | {{Reverse Engineering}} | ||
<noinclude>[[Category:Main]]</noinclude> | <noinclude>[[Category:Main]]</noinclude> |
Latest revision as of 04:31, 24 August 2023
Tools[edit | edit source]
IDA pro disassembler and debugger[edit | edit source]
(64-bit analysis is possible only with IDA Professional Edition)
recommended:
- IDA 6.5 (17 Dec 2013) or 6.6 (04 Jun 2014)
- Decompiler 1.9 x64 (04 Jun 2014), 1.9 x86/ARM (17 Dec 2013)
note: Hex-Rays 1.5 plugin works until IDA 6.4.130702. IDA 6.5 and higher require Decompiler 1.9 or higher.
Objdump[edit | edit source]
objdump -b binary -D -m i386:x86-64 file
Udis86[edit | edit source]
http://udis86.sourceforge.net/
c4decompiler[edit | edit source]
ollydbg 64[edit | edit source]
http://www.ollydbg.de/odbg64.html
HxD[edit | edit source]
Tutorials[edit | edit source]
- https://tacnetsol.wistia.com/projects/9srmkf6e02 Hardware Reverse Engineering
- https://web.archive.org/web/20190319221524/http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/ identifying and reverse engineering embedded serial ports
|