![]() You'll learn more about these tools in Chapter 5. To date, the premier source of these kinds of tools for Windows has been the SysInternals site, which can be found at In particular, the tools of interest are FileMon, RegMon, and if you're using NT, HandleEx. Windows doesn't come with any tools of this sort, so we have to go to a third party to get them. (A notable exception is if the program is primarily a network program, in which case you may want to skip straight to packet sniffing.) In most cases, this will mean starting with some system monitoring tools to determine what kinds of files and other resources the program accesses. ![]() Generally, you will want to start at a high level and work your way down. However, the methods used to reverse engineer are similar in most instances. Reverse engineering can be performed with a number of different tools, varying by operating system and personal taste. ![]() Reverse engineering programs are one of the most commonly used and accurate methods of finding vulnerabilities in a closed-source program. In Hack Proofing Your Network (Second Edition), 2002 Reverse Engineering Techniques
0 Comments
Leave a Reply. |