From Collaborative RCE Knowledge Library

Jump to: navigation, search

Introduction To Reverse Engineering Software

Item name: Introduction To Reverse Engineering Software
Rating: 0.0 (0 votes)
Author: Matt Briggs                        
Home URL:
Last updated: June 16, 2011
Version (if appl.):
Direct D/L link:
Description: This is a 2 days worth of class materials that you can use to teach your own classes.


Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to understand how they work. This is Reverse Engineering (RE), and it is done every day from recreating outdated and incompatible software, understanding malicious code, or exploiting weaknesses in software.

In this course we will explore what drives people to reverse engineer software and the methodology and tools used to do it.

Topics include, but are not limited to:
•Uses for RE
•The tricks and pitfalls of analyzing compiled code
•Identifying calling conventions
•How to navigate x86 assembly using IDA Pro
•Identifying Control Flows
•Identifying the Win32 API
•Using a debugger to aid RE
•Dynamic Analysis tools and techniques for RE

During the course students will complete many hands on exercises.

Introduction to x86 and Life of Binaries (both available at are prerequisites for this class.

This class will serve as a prerequisite for a later class specifically on malware analysis.
Related URLs: No related URLs have been submitted for this item yet

RSS feed Feed containing all updates for this item.

You are welcome to add your own useful notes about this tool, for others to see!

If you find that any information for the item above is missing, outdated or incorrect, please edit it!
(please also edit it if you think it fits well in some additional category, since this can also be controlled)

Category Navigation Tree
   Articles  (104)
   Linux  (41)
   Mac OS  (22)