___._ __..._ ,"' `'`- ``"-._ ,-"',` . ,' `-.._ / : .5Td8, . ~' `-. j _. ',8888888.`. \ _ 7 ;8888888888b. `. `' \,'`.`. |: , t8888888888888. . .`'. \` `'T8888888888888l. `. ^ `" \ Y : _ `8888"'```""8' ' J | --. :88P"sP"888b. ` . l .~ .( \ j '... j88b"`s `"sJ88 : `. |l dbs ;88888`""J8888l . J T-: Y8Y;888888888888888 'r . | ,sd8bs. ,sd8Y. `8.8888Y88888888888 ` : , | d88;`:88l d88;`:`| ? ,s8888888888888=Ys , ,' 888 888 888 ;8\ **88888888888888.' : . `r-' 888 888 888 ,888: y *,s88888888888Ys , / `Y8. ,8P' 888. . `8888888888888:8 ` ^. _,' `888' `888' ,J8l. 888J888b. : :8888888888P`888l.8 . . ``*8""` 888 ,d8b ,sd8bs. 88: :88 ,d8' `8b. 888;`:888 `. ```***``s88888888*d' \ :88dY`"P' d88;`:88l `Y8. ,8P' 888 888 888 888 `"", d88888888:T' .| :88: 888 888 ,J8l. 888 888 888 888 j :888P8*8.8888s. `. ,,*l :88 888sss8P' ,d8' `8b. 888 888 888 888 { . s:b:bd88888888888. `. :88 888 88: :88 888 888 888 888 `\ ,8888888888888888l"s ` : l :88 888 `LBS 88: :88 888 888 888 888 | `88888888888888888l " \. :88 888 88: 88: :88 888 888 888 888 _,'` ,d88888888888888888888b , l :88 888 88: 88: ;88 Y88:.,88P Y88:.;88P ,' ,d888888888888888888888888Y . ;8l88 888:.;88; ,888. ,888. `*Y8P*' `*Y8P*' -' ,d888888888888888888888888888 ,s`. `8. `*Y8P*'
Reverse Engineering for Noobs Part 1 Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames. Reverse Engineering for Noobs Part 2: Portable Executable Files Breakdown of Portable Executable image file headers and sections.