A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the basic forms of malware and how they work in simple terms.
-> Click HERE to read the article on LinkedIn.
This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the very basics of the binary number system.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the very basics of the hexidecimal number system.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the basics of transistors and memory.
-> Click HERE to read the article on LinkedIn.
Lesson 8: Assembly Language - Basic Malware Reverse Engineering (Part 8 - Bytes, Words, Double Words, etc...)
This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the basic architecture of an x86 processor.
-> Click HERE to read the article on LinkedIn.
Lesson 10: Assembly Language - Basic Malware Reverse Engineering (Part 10: General-purpose Registers)
This tutorial will address the general purpose x86 registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the x86 segment registers.
-> Click HERE to read the article on LinkedIn.
Lesson 12: Assembly Language - Basic Malware Reverse Engineering (Part 12: Instruction Pointer Register)
This tutorial will address the x86 instruction pointer register.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the x86 control registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the status, control and systems flags.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the stack.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the heap.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to install Ubuntu Linux on both Windows and MAC.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to install the vim text editor.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the age old question of why to bother understanding the basics of Assembly Language.
-> Click HERE to read the article on LinkedIn.
Lesson 20: Assembly Language - Basic Malware Reverse Engineering (Part 20 - Instruction Code Handling)
This tutorial will address op codes and instruction code handling.
-> Click HERE to read the article on LinkedIn.
Lesson 21: Assembly Language - Basic Malware Reverse Engineering (Part 21 - How To Compile A Program)
This tutorial will address how to compile a basic x86 Assembly Program.
-> Click HERE to read the article on LinkedIn.
Lesson 22: Assembly Language - Basic Malware Reverse Engineering (Part 22 - ASM Program 1 [Moving Immediate Data])
This tutorial will address how to create our first real Assembly Program by moving immediate data.
-> Click HERE to read the article on LinkedIn.
Lesson 23: Assembly Language - Basic Malware Reverse Engineering (Part 23 - ASM Debugging 1 [Moving Immediate Data])
This tutorial will address how to debug our first real Assembly Program by moving immediate data.
-> Click HERE to read the article on LinkedIn.
Lesson 24: Assembly Language - Basic Malware Reverse Engineering (Part 24 - ASM Hacking 1 [Moving Immediate Data])
This tutorial will address how to hack our first real Assembly Program by moving immediate data.
-> Click HERE to read the article on LinkedIn.
Lesson 25: Assembly Language - Basic Malware Reverse Engineering (Part 25 - ASM Program 2 [Moving Data Between Registers])
This tutorial will address how to create our second real Assembly Program by moving between registers.
-> Click HERE to read the article on LinkedIn.
Lesson 26: Assembly Language - Basic Malware Reverse Engineering (Part 26 - ASM Debugging 2 [Moving Data Between Registers])
This tutorial will address how to debug our second real Assembly Program by moving between registers.
-> Click HERE to read the article on LinkedIn.
Lesson 27: Assembly Language - Basic Malware Reverse Engineering (Part 27 - ASM Hacking 2 [Moving Data Between Registers])
This tutorial will address how to hack our second real Assembly Program by moving between registers.
-> Click HERE to read the article on LinkedIn.
Lesson 28: Assembly Language - Basic Malware Reverse Engineering (Part 28 - ASM Program 3 [Moving Data Between Memory And Registers])
This tutorial will address how to create our third real Assembly Program by moving between memory and registers
-> Click HERE to read the article on LinkedIn.
Lesson 29: Assembly Language - Basic Malware Reverse Engineering (Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers])
This tutorial will address how to debug our third real Assembly Program by moving between memory and registers.
-> Click HERE to read the article on LinkedIn.
Lesson 30: Assembly Language - Basic Malware Reverse Engineering (Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers])
This tutorial will address how to hack our third real Assembly Program by moving between memory and registers.
-> Click HERE to read the article on LinkedIn.
Lesson 31: Assembly Language - Basic Malware Reverse Engineering (Part 31 - ASM Program 4 [Moving Data Between Registers And Memory])
This tutorial will address how to create our fourth real Assembly Program by moving between registers and memory.
-> Click HERE to read the article on LinkedIn.
Lesson 32: Assembly Language - Basic Malware Reverse Engineering (Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory])
This tutorial will address how to debug our fourth real Assembly Program by moving between registers and memory.
-> Click HERE to read the article on LinkedIn.
Lesson 33: Assembly Language - Basic Malware Reverse Engineering (Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory])
This tutorial will address how to hack our fourth real Assembly Program by moving between registers and memory.
-> Click HERE to read the article on LinkedIn.
Lesson 34: Assembly Language - Basic Malware Reverse Engineering (Part 34 - ASM Program 5 [Indirect Addressing With Registers])
This tutorial will address how to create our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE to read the article on LinkedIn.
Lesson 35: Assembly Language - Basic Malware Reverse Engineering (Part 35 - ASM Debugging 5 [Indirect Addressing With Registers])
This tutorial will address how to debug our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE to read the article on LinkedIn.
Lesson 36: Assembly Language - Basic Malware Reverse Engineering (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers])
This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE to read the article on LinkedIn.
Lesson 37: Assembly Language - Basic Malware Reverse Engineering (Part 37 - ASM Program 6 [CMOV Instructions])
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click HERE to read the article on LinkedIn.
Lesson 38: Assembly Language - Basic Malware Reverse Engineering (Part 38 - ASM Debugging 6 [CMOV Instructions])
This tutorial will address how to debug our sixth real Assembly Program with CMOV instructions.
-> Click HERE to read the article on LinkedIn.
Lesson 39: Assembly Language - Basic Malware Reverse Engineering (Part 39 - ASM Hacking 6 [CMOV Instructions])
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click HERE to read the article on LinkedIn.
This tutorial will conclude this x86 tutorial.
-> Click HERE to read the article on LinkedIn.
This tutorial will introduce our ARM Assembly tutorial series.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss number systems such as binary, decimal and hexidecimal in detail.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary addition.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary subtraction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss word lengths.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the program counter.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the CPSR.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the Link Register.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the Stack Pointer.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss ARM Firmware Boot Procedures.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss Von Neumann Architecture.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the instruction pipeline.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the add instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging the add instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking the add instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the adds instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging the adds instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking the adds instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the ADC instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging the ADC instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking the ADC instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the SUB instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging the SUB instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking the SUB instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will introduce our ARM Reverse Engineering course.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss number systems.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary addition.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary subtraction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss word lengths.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss program counter.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the CPSR.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the link register.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the stack pointer.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the firmware boot procedures.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the Von Neumann Architecture.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the instruction pipeline.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the basics of a hello world program in ARM 32-bit.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging hello world.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking hello world.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss constants.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging constants.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking constants.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss character variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging character variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking character variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss boolean variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging boolean variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking boolean variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss integer variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging integer variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking integer variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss float variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging float variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking float variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss double variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging double variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking double variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the sizeof operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging sizeof operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking sizeof operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the pre-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging pre-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking pre-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the post-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging post-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking post-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the pre-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging pre-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking pre-decrement operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-46-hacking-pre-decrement-kevin-m-thomas/ to read the article on LinkedIn.
This tutorial will discuss post-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging post-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking post-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the cyber revolution.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss transistors.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss logic gates.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss number systems.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary addition.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary subtraction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss word lengths.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the general architecture.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss calling conventions.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss boolean instructions.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss pointers.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss load effective address.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the data segment.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the shl instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the shr instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss rol instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the ror instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss c++ code as it relates to 64-bit assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-35-c-1-debug-2-kevin-m-thomas/ to read the article on LinkedIn.
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss c and how it relates to x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss x64 networking basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the power of the c language.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking hello world.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking branches.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking pointers.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the course concepts and the meaning of life.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss how to set up our development in 64-bit ARM with Kali Linux.
-> Click HERE to read the article on LinkedIn.
This tutorial hacks a 32-bit ARM hello world program.
-> Click HERE to read the GitHub tutorial.
This tutorial hacks a 32-bit ARM int program.
-> Click HERE to read the GitHub tutorial.
This tutorial hacks a 32-bit ARM float program.
-> Click HERE to read the GitHub tutorial.
This tutorial hacks a 32-bit ARM double program.
-> Click HERE to read the GitHub tutorial.
This tutorial hacks a 32-bit ARM char program.
-> Click HERE to read the GitHub tutorial.
This tutorial hacks a 32-bit ARM char pointer program.
-> Click HERE to read the GitHub tutorial.