Newest Hacks

Ghosts'n Goblins Restoration Super Riff World Refill Weapon after Death Refill Weapon after Death

Newest Translations

Mega Man X3 Top Roller Konami's Tennis Konami’s Boxing

Newest Utilities

Crash 2 Level Editor BARF! Tilemap Studio Lightweight Checksum Calculator

Newest Reviews

Schala Edition Prince of Persia 2 - Remastered Edition Super Turrican Plus King Colossus

Newest Homebrew

Rex Run for Game Boy DeadlyNeuroEf Circle Boy Nova the Squirrel

Featured Hack Images

Yoshi’s Island: Yoshi Color Fix Byte’s Adventure Cheetahmen II - Bugfixed version 2.1 Rockman P (Peercast)

Featured Translation Images

Namida no Soukoban Special Head Buster Torneko no Daibouken: Fushigi no Dungeon Monkey Island 2: LeChuck's Revenge

Recent Updates

Introduction to Reverse Engineering WIN32 Applications

Assembly

Description:

This paper will introduced the reader to many concepts and tools essential to understanding and controlling native WIN32 applications through the eyes of Windows Debugger (WinDBG). Throughout, WinMine will be utilized as a vehicle to deliver and demonstrate the functionality provided by WinDBG and how this functionality can be harnessed to aid the reader in reverse engineering native WIN32 applications. Topics covered include an introductory look at IA-32 assembly, register significance, memory protection, stack usage, various WinDBG commands, call stacks, endianness, and portions of the Windows API. Knowledge gleaned will be used to develop an application designed to reveal and/or remove bombs from the WinMine playing grid.

Links:

User Review Information

No User Reviews!