![]() The goal of this blog post is to make it reproduceable for others, so the same steps can be repeated. We will compile C++ code and perform dynamic analysis with Wireshark to see how the activities look on the wire. This blog post is primary focused on doing packet capture. The second blog post will be loading the binary into a disassembler and walk through the code, instead of the network packets. ![]() First, we will start with doing packet capture with Wireshark to learn more about how a binary works on the ‘wire’. Today, I would like to start my blog series on how I approach a technical topic with the goal to understand the implementation details as much as possible. It has been a while that I decided to blog, but I’ve been lately into Reverse Engineering.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |