Newest Hacks

Latinfix Super Royal Pals. Brightness fix The Rainbow Realms 2

Newest Translations

Final Fight Adventure Island Gekido Advance - Kintaro's Revenge Fire Emblem: Thracia 776

Newest Utilities

sf_decrunch Elemental Gearbolt (PSX) BIN repacker Super Gokuden 1 Translation Tools DashEditor - Mega Man Legends Translation Toolkit

Newest Reviews

Super Royal Pals. Super Royal Pals. 2 Metroid mOTHER Super Mario Bros. - Mario Vs. Airman

Newest Homebrew

4 Way Play test ROM Retail Clerk '89 Sega Genesis 6 button controller test Parachute

Featured Hack Images

Quest for the Missing Hat SHOOP-MAN Soldier Name Reverter Yuletide Bros.

Featured Translation Images

Attack Animal Gakuen Hammerin’ Harry World Soccer: Winning Eleven 6 - Final Evolution Akazukin Cha Cha Cha

Recent Updates

Introduction to Reverse Engineering WIN32 Applications

Assembly

Description:

This paper will introduced the reader to many concepts and tools essential to understanding and controlling native WIN32 applications through the eyes of Windows Debugger (WinDBG). Throughout, WinMine will be utilized as a vehicle to deliver and demonstrate the functionality provided by WinDBG and how this functionality can be harnessed to aid the reader in reverse engineering native WIN32 applications. Topics covered include an introductory look at IA-32 assembly, register significance, memory protection, stack usage, various WinDBG commands, call stacks, endianness, and portions of the Windows API. Knowledge gleaned will be used to develop an application designed to reveal and/or remove bombs from the WinMine playing grid.

Links:

User Review Information

No User Reviews!