Helpful Resources on C/C++, Assembly, Reverse Engineering and Malware Analysis

Submitted by Harry on Sun, 10/18/2020 - 21:17

I have compiled some helpful resources on C/C++, Assembly, Reverse Engineering and Malware Analysis. Hope you will find it useful. I will try to update this page as often as I can. 

(Thanks to all people who have put out this awesome content for all of us to learn and expand our skills)

How to Find main() in a Stripped Binary

Submitted by Harry on Sat, 07/04/2020 - 22:33

Locating main() in a stripped binary can be tricky. To start static or dynamic analysis, we need to understand how main() is actually called. From a thirty thousand foot view, this is what we know:

_start() -> __libc_start_main() -> main() 

_start() is called first. We can find its starting memory address also called "Entry Point" using "readelf".

Example: readelf -h nameofbinary