diff --git a/static/reversing-workshop.html b/static/reversing-workshop.html new file mode 100644 index 0000000..80f5a4e --- /dev/null +++ b/static/reversing-workshop.html @@ -0,0 +1,944 @@ + + +
+ + +A workshop by VikeSec
+We will be:
+++“Reverse engineering is a process or method through which one +attempts to understand through deductive reasoning how a previously made +[thing] accomplishes a task with very little insight into exactly how it +does so.”
+
Cracking open something in order to understand it, with very little +outside help.
+$ stat assets/img/vikesec.png
+ File: assets/img/vikesec.png
+ Size: 19753 Blocks: 40 IO Block: 4096 regular file
+Device: 8,32 Inode: 91725 Links: 1
+Access: (0755/-rwxr-xr-x) Uid: ( 1000/ malcolm) Gid: ( 1000/ malcolm)
+Access: 2023-10-09 13:27:11.557494189 -0700
+Modify: 2023-10-09 13:27:08.524161649 -0700
+Change: 2023-10-09 13:29:06.726631168 -0700
+ Birth: 2023-10-09 13:27:08.513328318 -0700
+ff d8 ff
89 50 4e 47 0d 0a 1a 0a
or
+"\x89PNG\r\n\x1a\n"
7f 45 4c 46
or "\x7fELF"
4d 5a
or "MZ"
file
command works!$ head -c 4 < hello | hexdump -C
+00000000 7f 45 4c 46 |.ELF|
+00000004
+
+$ file hello
+hello: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8f1c454f8491c77bf16b885d6dda8de0db00a19f, for GNU/Linux 4.4.0, not stripped
+#include <stdio.h>
+
+const int pi = 3.14; // read only memory (global const)
+double e = 2.71; // global va
+
+int main( // code
+ int argc, char** argv // stack (param)
+ ) {
+ char name[] = "VikeSec"; // stack (local)
+ printf( // other (dynamically linked function)
+ "Hello, %s!", // read only memory (string literal)
+ name // stack (local)
+ );
+ return 0;
+}