Mostly notes for my self, but this is one thing I am interested in learning about. Thanks to my friend M who gave me alot of these links!
0xinfectionl - Reverse Engineering for Everyone - x86, ARM-32, x64, ARM-64, Pico Hacking
Cool tool to paste in some assembler and convert from mnomics to binary and vice versa
Microcorruption Game - haven’t played alot, but could be fun.
Exercises in Reverse Engineering - something to get started on
Tools to get familiar with:
Syntax Styles
Intel Syntax
- first operand is the
destination
, and the second operand is thesource
- No prefix on registers or immediates
- Immedates are suffixed with
h
andb
- If the first hexadecimal digit is a letter then the value is prefixed by a
0
. - Base registers use
[ ]
1
2
3
addl eax, [ebx]
mov eax,1
AT&T Syntax
- Registers prefixed with
%
- Immediates prefixed with
$
, hex is prefixed with 0x - First operand is the
source
, and the second operand is thedestination
- Base registers use
( )
1
2
addl (%ebx), %eax
movl $1,%eax
More details here