Informative Information for the Uninformed
Current
v9
v8
v7
v6
v5
v4
v3
v2
v1
All
About
Vol all
»
Archive
Next:
Contents
Introduction to Reverse Engineering Win32 Applications
trew
trew@exploit.us
Contents
Foreword
Introduction
Getting Started
Identifying Goals
Symbols and Debuggers
Symbol Server
Getting Familiar with WinDBG
WinDBG Windows
Locating the WinMine Playing Grid
Loaded Modules
Loaded Symbols
Memory Protection
Understanding Assemblies
Endianness
Conditions
Stacks and Frames
Interpreting the Playing Grid
Removing Mines
Virtual Mine Sweeper
Conclusion
References
About this document ...