mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-24 01:14:24 +01:00
23 lines
742 B
Markdown
23 lines
742 B
Markdown
---
|
||
layout: default
|
||
permalink: /RE101/section1.2/
|
||
title: Fundamentals
|
||
---
|
||
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
||
|
||
# Section 1.2: Fundamentals #
|
||
|
||
## Anatomy of a Windows PE C program ##
|
||
|
||
Typical windows programs are in the Portable Executable (PE) Format. It’s portable because it contains information, resources, and references to dynamic-linked libraries (DLL) that allows windows to load and execute the machine code.
|
||
|
||

|
||
|
||
## PE Header ##
|
||
|
||
## Memory Layout ##
|
||
|
||
## The Stack ##
|
||
|
||
[Environment Setup <- Back](https://securedorg.github.io/RE101/section1) | [Next -> x86 Assembly](https://securedorg.github.io/RE101/section1.3)
|