Nightmare – Guided Intro to Binary Exploitation/Reverse Engineering(guyinatuxedo.github.io) |
Nightmare – Guided Intro to Binary Exploitation/Reverse Engineering(guyinatuxedo.github.io) |
You can then abstract that understanding into macro-intuitions of control flow. When opening a black box binary in IDA for the first time, this allows you to think in terms of "X input results in control flow path Y which gives me access to function Z and - because of calling convention - register A to redirect execution to memory location M." Now you're in business and can worry about shellcode, ROP chains, whatever.
Just a couple of cents from the trenches.
Uhhhh....