Understanding PE Parsing for Reverse Engineers Part 2 - The Section Table (Patreon)
Published:
2023-05-24 23:53:07
Imported:
2023-09
Downloads
Content
This is the second in a four-part series on PE parsing from a reverse engineering perspective. In this tutorial we take a deep dive into the PE section table and discuss the difference between mapped and unmapped PE files.
Code References
The following are links to the code that was used in the tutorial. These are handy to keep as references as they have the structures and patterns that can be used in IDA when marking up pseudocode.
Further Reading
- PE file diagram from Corkami
- An In-Depth Look into the Win32 Portable Executable File Format (Inside Windows)
- An In-Depth Look into the Win32 Portable Executable File Format Part 2 (Inside Windows)
- Example PE parsing from iredteam
- VERGILIUS
- GetModuleHandle translation to base address (Stack Overflow)
Hands-On Example
Attached to this post is the compiled example from the tutorial (64-bit) and a 32-bit version of the same example. See if you can replicate the pseudocode markup from the tutorial with both samples.