Skip to main content

Introduction

While the last three sessions introduced concepts regarding processes, executables and the means to investigate them, this session will, finally, focus on how to manipulate apps to do strange and (sometimes) undesired behaviour.

Reminders and Prerequisites

  • hexadecimal representation
  • process address space
  • x86 Assembly knowledge: memory addressing and basic commands
  • Ghidra, objdump, nm, gdb