mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2026-01-04 14:54:30 +01:00
updating navigation
This commit is contained in:
@@ -7,13 +7,16 @@ title: Fundamentals
|
||||
|
||||
# Section 1.2: Fundamentals #
|
||||
|
||||
## Anatomy of a C program ##
|
||||
## Anatomy of a Windows PE C program ##
|
||||
|
||||
Typical windows programs are in the Portable Executable (PE) Format. It’s portable because it contains information, resources, and references to dynamic-linked libraries (DLL) that allows windows to load and execute the machine code.
|
||||
|
||||

|
||||
|
||||
## x86 Assembly ##
|
||||
## PE Header ##
|
||||
|
||||
### Registers ###
|
||||
## Memory Layout ##
|
||||
|
||||
### Opcodes ###
|
||||
## The Stack ##
|
||||
|
||||
[Environment Setup <- Back](https://securedorg.github.io/RE101/section1) | [Next -> x86 Assembly](https://securedorg.github.io/RE101/section1.3)
|
||||
|
||||
24
fundamentals3.md
Normal file
24
fundamentals3.md
Normal file
@@ -0,0 +1,24 @@
|
||||
---
|
||||
layout: default
|
||||
permalink: /RE101/section1.3/
|
||||
title: Fundamentals
|
||||
---
|
||||
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
||||
|
||||
# Section 1.3: Fundamentals #
|
||||
|
||||
## x86 Assembly ##
|
||||
|
||||
### Opcodes and Instructions ###
|
||||
|
||||
### Registers ###
|
||||
|
||||
## A Function and Calling a Function ##
|
||||
|
||||
### Arguments ###
|
||||
|
||||
### Local Variables ###
|
||||
|
||||
### The Stack ###
|
||||
|
||||
[Intro <- Anatomy of PE](https://securedorg.github.io/RE101/section1.2) | [Next -> Malware Techniques](https://securedorg.github.io/RE101/section2)
|
||||
Reference in New Issue
Block a user