It would be really helpful for my understanding if someone could explain what some good general approaches to reverse engineering assembly manually would be or any insights into the functions themselves. ![]() It is a program that takes an input "username" string, and returns a (most-likely) unique 8-digit hex number for identification purposes. I have a disassembled C binary that I would like to reverse engineer.
0 Comments
Leave a Reply. |