mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-19 07:04:20 +01:00
updating mistakes
This commit is contained in:
@@ -9,18 +9,6 @@
|
||||
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js"></script>
|
||||
<script language="JavaScript">
|
||||
|
||||
$("#btnPrint").live("click", function () {
|
||||
var divContents = $("#display").html();
|
||||
var printWindow = window.open('', '', 'height=400,width=800');
|
||||
printWindow.document.write('<html><head><title>Malware Analysis Report</title>');
|
||||
printWindow.document.write('</head><body >');
|
||||
printWindow.document.write(divContents);
|
||||
printWindow.document.write('</body></html>');
|
||||
printWindow.document.close();
|
||||
printWindow.print();
|
||||
|
||||
});
|
||||
|
||||
function showInput() {
|
||||
document.getElementById('display').innerHTML =
|
||||
|
||||
@@ -127,7 +115,7 @@ IP address</small></p>
|
||||
<p><label>Your Report: </label></p>
|
||||
<hr>
|
||||
<p><span id='display'></span></p>
|
||||
<p><input type="button" value="Print PDF Report" id="btnPrint" /></p>
|
||||
|
||||
|
||||
</script>
|
||||
|
||||
|
||||
@@ -34,7 +34,7 @@ This diagram shows the relationship of application components for user-mode and
|
||||
|
||||
## PE Header ##
|
||||
|
||||
The PE header provides the information to operating system on how to map the file into memory.
|
||||
The PE header provides information to operating system on how to map the file into memory.
|
||||
The executable code has designated regions that require a different memory protection (RWX)
|
||||
- Read
|
||||
- Write
|
||||
@@ -69,7 +69,7 @@ This diagram illustrates how the PE is placed into memory.
|
||||
|
||||
## The Stack ##
|
||||
|
||||
- Data is either pushed onto or pop off of the stack data structure
|
||||
- Data is either pushed onto or popped off of the stack data structure
|
||||
- **EBP** - Base Pointer is the register that used to store the references in the stack frame
|
||||
|
||||
This diagram represents a typical stack frame.
|
||||
|
||||
@@ -41,7 +41,7 @@ Common Instructions
|
||||
* **jmp, jne, jnz, jnb** (Control Flow)
|
||||
* **push, pop, call, leave, enter, ret** (Control Flow)
|
||||
|
||||
Example below is moving value 0xaaaaaaaa into ecx.
|
||||
Example below is moving value at 0xaaaaaaaa into ecx.
|
||||
|
||||
| Instruction | Opcode |
|
||||
| --- | --- |
|
||||
|
||||
2
intro.md
2
intro.md
@@ -11,7 +11,7 @@ title: Intro
|
||||
|
||||
# Reverse Engineering #
|
||||
|
||||
"is the processes of extracting knowledge or design information from anything man-made and re-producing it or re-producing anything based on the extracted information"
|
||||
"is the processes of extracting knowledge or design information from anything man-made and re-producing it or re-producing anything based on the extracted information"[1](https://en.wikipedia.org/wiki/Reverse_engineering)
|
||||
|
||||
## What does it mean to be a reverse engineer? ##
|
||||
|
||||
|
||||
Reference in New Issue
Block a user