Applied Emulation - Module 3 (Patreon)
Downloads
Content
Reverse Engineering With Emulation
This is the third part in our five-part tutorial series on emulation. In this module we learn how to apply emulation to common reverse engineering tasks. The module is accompanied by a live demo and a lab that builds on the concepts we discuss.
Please Note - Based on feedback this is the most difficult module in the series as the examples and labs build on previous reverse engineering experience. If you are not familiar with how the stack is used, calling conversions, and memory access we strongly recommend completing the OALABS tutorial series covering these topics. If you get stuck reach out in the #oa-reversers or #tutorial-help discord channels!
Unicorn Cheat Sheet (Alex Hanel)
https://github.com/alexander-hanel/unicorn-engine-notes
Lab Exercise
The lab for this module is contained in the lab3_zip file. Download lab3_zip, unzip, and run jupyter-lab from the root of the unzipped directory. Once Jupyter Labs is launched in your browser open the lab notebook and follow the instructions.