Intro to the subject
So, what exactly is reverse engineering? What's the point of it? How does it work? Who does it? Reverse engineering, in the world of malware analysis, is the process of understanding what a specific software, application, etc ( usually malware ) does, without having the source code for it.
Reverse engineering is usually done by people in the cybersecurity world. When software gets compiled, it gets compiled to . Machine code is what is read and processed by the . Machine code is basically unreadable by humans, and that is where come in clutch. Disassembly converts machine code to its human readable equivalent, assembly. Assembly can be regarded as one language, with multiple different flavors. Think of the assembly language as the concept of ice-cream. There is only one concept for ice-cream, but there are many different flavors of it, In the simplest terms, assembly is any low-level language whose most closely match that flavor's instructions. As we progress through this blog, we'll mostly be working with the x86 flavor, as it is most common in the world of malware.
Before moving on to x86 assembly, an understanding of the of computer science is important.
Last updated
Was this helpful?