Home Artists Posts Import Register

Downloads

Content

Reverse Engineering With Emulation

This is the third part in our five-part tutorial series on emulation. In this module we learn how to apply emulation to common reverse engineering tasks. The module is accompanied by a live demo and a lab that builds on the concepts we discuss.

Please Note - Based on feedback this is the most difficult module in the series as the examples and labs build on previous reverse engineering experience. If you are not familiar with how the stack is used, calling conversions, and memory access we strongly recommend completing the OALABS tutorial series covering these topics. If you get stuck reach out in the #oa-reversers or #tutorial-help discord channels! 


Unicorn Cheat Sheet (Alex Hanel)

https://github.com/alexander-hanel/unicorn-engine-notes


Lab Exercise

The lab for this module is contained in the lab3_zip file. Download lab3_zip, unzip, and run jupyter-lab from the root of the unzipped directory. Once Jupyter Labs is launched in your browser open the lab notebook and follow the instructions.

Files

Applied Emulation Module 3 - Reverse Engineering With Emulation

This is "Applied Emulation Module 3 - Reverse Engineering With Emulation" by OALABS on Vimeo, the home for high quality videos and the people who love them.

Comments

No comments found for this post.