Part 32 - x64 Assembly [Part 6]
For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/Reverse-Engineering-Tutorial
Let’s review our code.
Compile…
Debug…
Let’s evaluate what is inside the memory address of 0x6000d8.
As we can see “Hello World“ with the return character will then be moved into our RSI register.
Next week we will examine this a bit closer.
当前内容版权归 mytechnotalent 或其关联方所有,如需对内容或内容相关联开源项目进行关注与资助,请访问 mytechnotalent .