x64 Reverse Engineering (Part 21 - Boot Sector Basics [Part 4])

x64 Reverse Engineering (Part 21 - Boot Sector Basics [Part 4])

For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/Reverse-Engineering-Tutorial

Today we continue our Boot Sector Basics. Let's examine the code:

No alt text provided for this image

We add a string to our code as seen above and compile.

No alt text provided for this image

Let's examine the binary in a hex editor.

No alt text provided for this image

Closely examine the above. We see our original code which we do not have to review however now we see a series of numbers, hex numbers that represent ASCII characters. We see that each letter corresponds with a letter. When we say that ultimately everything goes down to 0 and 1 this is a proof of concept. As you can see EB is selected above and we can see those hex values ultimately go to 11101011 in binary.

Homework: Google and research the ASCII conversion table and do some research on your own and better understand how hex values represent characters.

Next week we take it to the next level. Stay tuned!

To view or add a comment, sign in

Explore topics