Malware Reverse Engineering: part 3 Lets Go MASM

To be a good reverse Engineer you mush have  at least basic knowledge of Assembly Language , Everything executed returns to assembly inside the memory , and mastering assembly will make your life easier when you try to understand the behavior of a piece of code executed  in front of you ...

MASM 


The Microsoft Macro Assembler (MASM)  is an x86 assembler that uses the Intel syntax for MS-DOS and Microsoft Windows. Beginning with MASM 8.0 there are two versions of the assembler - one for 16-bit and 32-bit assembly sources, and another (ML64) for 64-bit sources only.
MASM is maintained by Microsoft, but since version 6.12 has not been sold as a separate product, it is instead supplied with various Microsoft SDKs and C compilers. Recent versions of MASM are included with Microsoft Visual Studio.


Reading List

This is one of the best guides ever in assembly
http://www.woodmann.com/RCE-CD-SITES/Hutch/masm.htm


Security Tube : Windows Assembly Language Megaprimer for Hackers
http://www.securitytube.net/groups?operation=view&groupId=6





No comments:

Post a Comment