Reverse engineering is really a pretty cool area of computer security. You need not be frightened by it though if you have limited programming knowledge. That said, the more programming knowledge you have the better, especially so as it pertains to Assembly. There are certain things that you will be looking for in an executable that you are attempting to do RCE (reverse code engineering) on. The usual error prone functions such as the str* series is always a good start. Also you may want to go looking for any mathematical functions which could indicate encryption are always a good bet as well. There is some very interesting research being done as I believe I already mentioned by the Metasploit crew on a new tool that will help one do RCE. Anyhow, should any of you have some war stories you would like to share that Reverse Engineering related feel free to share them.
About The Author
Read Next
VPN’s and fragmentation
Well I would imagine most of you have Virtual Private Network’s (VPN) on your corporate network. That plus the use of an IDS can potentially…
2007 e-Crime Survey
2007 e-Crime Watch Survey and the 5th Annual Global State of Information Security Awareness of information security and identity theft issues is at an all-time…
More Microsoft patching
A good number of you are likely aware that Microsoft just issued another series of patches recently. I’m curious though to know if any of…
ISP Abuse departments
Well I have always known that ISP abuse departments are generally very lame. They never seem to bother returning any darn email that you send…