Therefore a disassembler is also platform-specific (even though there are a couple of disassemblers that contain specific support for multiple platforms). Each platform provides a different set of instructions and registers. It is trivial to say, the specific instruction encoding format and the resulting textual representation are entirely platform-specific. The disassembler merely decodes each instruction and creates a textual representation for the code. Essentially, a disassembler decodes binary machine code into a readable assembly language code. The disassembler is one of the most significant reverse engineering apparatuses. Offline code analysis is a powerful approach because it provides a good outline of the program and makes it easy to search for specific functions that are of interest. Reversing is then performed by manually reading and analyzing parts of that output. Generally speaking, there is one fundamental reversing methodology: offline analysis, which is all about taking a binary executable and using a disassembler to convert the machine code into a human-readable form. There are ‘n’ numbers of approaches for reverse engineering, and picking the appropriate one depends on the target program, the platform on which it runs and on which it was developed, and what kind of information you’re seeking to extract. This article showcases the particulars of these contents:
0 Comments
Leave a Reply. |