Hi All
After a very long break today i return with series of articles about reverse engineering from a beginner perspective it how i started reverse engineering and what s knowledge that i have got and technique that i have learned .
When we talk about reverse engineering we have to mention also malware analysis one of the big topic that can improve your AV technique and knowledge in the same time infection technique so it s an amazing world to discover but need also a big motivation and hard work.
I think programming knowledge of any language is a must to get familiar with logic of programming .
do you need suggestion from my point of view C programming language is the best one( because it s in the middle it n not high or low level language ).
the second step is Assembly Language programming NASM or MASM is fine the same syntax with some minor differences.
If you those condition are meet you can start to get your hand dirty in some basic challenge and you will be able to solve them.
to improve your skills a good knowledge about executable file format : PE and ELF file.
in this step you have to choose a path for you if you want reverse engineering in linux binary you have to dig deeper in C language system and kernel programming or you will choose the path to windows to dig deeper in windows API system and kernel programming.
if you finish those step that s mean that you have the necessary knowledge to tackle any challenge in user-land or kernel-land in the same time will have a great power to challenge you knowledge in malware analysis that uses the most sophisticated programming technique (obfuscation,packing, Anti-debugging,AV .....etc).
This is a brief introduction to my series of challenge that i will share with in the next few day and same time i will update this article with ressources
Stay tuned ( I have already published 2 challenges we are just in the start of the adventure)
Kind regards
By OffensiveNoob
Looking forward to it Brother
ReplyDelete