Our Scenarios
reverse

REMA Executable Headers

Info

Executable file headers are the map of an executable. They provide crucial information to the OS in order to load the file in memory and begin executing. In addition to that, executable files can be packed with debug information, resources such as images and icons, and many more. Most Operating Systems have their own standardized executable header structure definitions. This is one of the reasons (amongst many other) why you are unable to execute a UNIX program under Windows, even if the program was compiled for the same processor architecture.

What you will learn

  • Low level code understanding
  • Basic reverse engineering techniques.
  • Basic malware analysis techniques.

Scenario pre-requisites

It is recommended, but not necessary to be familiar with the following concepts: * Assembly language * C programming language * Basic Windows usage * oledbg

Technical Details

  • Connect with RDP(Remote Desktop Protocol) to the machine 192.168.125.100
    • Username: w7admin
    • Password: pass777word888
  • MODESINGLEPLAYER
  • TYPECCL
  • DIFFICULTYEASY
  • TIME60 MINUTES
  • COST10 CRYSTALS
SHARE