Calling Conventions For Reverse Engineering

Guided Hacking
Guided Hacking
6.4 هزار بار بازدید - 4 ماه پیش - 🔥 Learn How Calling Conventions
🔥 Learn How Calling Conventions Work For Reverse Engineering & Game Hacking
👨‍💻 Buy Our Courses: https://guidedhacking.com/register/
💰 Donate on Patreon: Patreon: guidedhacking
❤️ Follow us on Social Media: https://linktr.ee/guidedhacking

🔗 Learn More: https://guidedhacking.com/threads/cal...

❤️ Thank You to Malcore: https://link.malcore.io/redirect/guid...

👨‍💻 Script & Visuals by rexir: https://guidedhacking.com/members/280...
👩‍💻 Narration by wahsami: https://guidedhacking.com/members/wah...

📜 Video Description:
Today we're going to explore the low level world of calling conventions, which are essentially the guidelines that dictate how function arguments are passed. Understanding calling conventions is key to comprehending assembly code, especially when you're involved in reverse engineering tasks. It's important to recognize how the stack operates, growing and shrinking through various push and pop instructions. Remember, the stack is just one segment within a process's memory, with others like the heap, code, and data sections playing their pivotal roles.

As a foundational concept, the function prologue sets the stage for a better comprehension of calling conventions. Think of the prologue as a routine that preps the system for the task ahead, ensuring that once the function is called, everything operates seamlessly. We'll also explore different calling conventions—cdecl, stdcall, and fastcall—each with its unique mechanism for managing arguments and maintaining system stability. Furthermore, learning about these conventions will illuminate the cleanup processes and the distinctions between caller and callee cleanups. Let's not forget our sponsor, Malcore.io, who has greatly simplified the process of scanning files for unknown threats with their innovative online malware analysis tools.

📝 Timestamps:
00:00 Intro to Calling Conventions
00:16 Stack Mechanics
01:16 Malcore Is Dank
02:17 Function Prologue
03:00 cdecl calling convention
04:01 AddNum Example
05:00 cdecl Cleanup
05:30 stdcall
06:01 FastCall Variants
07:28 Microsoft FastCall
07:47 thiscall Convention

✏️ Tags:
#reverseengineering #gamehacking #malwareanalysis
thiscall calling convention
cdecl calling convention
calling convention x64
reverse engineering
x64 calling convention
x86 calling convention
calling convention
x86 calling conventions
calling convention x86
reverse engineering
x86-64 calling convention
c++ calling conventions
c++ calling convention
fastcall calling convention
stdcall calling convention
reverse engineering
windows calling convention
calling conventions
function calling convention
calling conventions c++
4 ماه پیش در تاریخ 1403/02/13 منتشر شده است.
6,482 بـار بازدید شده
... بیشتر