Reverse Engineering

Watch the first few minutes on us! If you'd like to watch the entire video and hundreds more like it, download code samples, and leave comments, log in or purchase a subscription.



Comments

You must log in to view comments.

Instructor

John Robbins

Description

If you blow the stack in a native C++ application or crash with a memory corruption, there’s no telling where you will end up. In the previous section titled "Mastering Assembly Language," you learned how to read that sea of assembly language, and in this section, you’ll put that knowledge to use. You'll learn about The Visual Studio Disassembly window, how to look up the parameters to functions and methods, how to walk the stack manually, and much more.

Table of Contents

{{toc.Position}} {{toc.Text}}

Related Links

  • {{link.LinkText}} (requires a paid subscription)

Series

This course is part of the following series: