Introduction To X86 Disassembly -
You look through a digital microscope (a like IDA Pro or Ghidra). You see a sequence of hex numbers: B8 05 00 00 00 . The disassembler translates this into: MOV EAX, 5
Before you look at the code, you look at your tools. Your workbench has a few small slots to hold data while you work. In x86, these are your : EAX: Your primary calculator.
To understand how it works, you have to look at the "gears" while they move. In the world of computers, those gears are and Instructions . 1. The Workbench (The CPU & Registers)
As you dig deeper, you find a "Stack"—a literal pile of data. Programs use the to remember where they were before they started a side-task. The program PUSHes its current location onto the stack.
This is your first "artifact." You realize the machine is the number 5 into the EAX slot. The next line says ADD EAX, 10 . Now you know the machine is calculating 3. The Locked Door (Control Flow)
Are you interested in or exploit development ?
By the end of your "excavation," you aren't just looking at random numbers anymore. You can see the logic, the loops, and the secrets. You’ve successfully reverse-engineered the machine’s intent without ever seeing the original blueprints. If you’d like to dive deeper, let me know:
This is a fork in the road. If the answer isn't 20, the machine "jumps" to a completely different section of code.
You look through a digital microscope (a like IDA Pro or Ghidra). You see a sequence of hex numbers: B8 05 00 00 00 . The disassembler translates this into: MOV EAX, 5
Before you look at the code, you look at your tools. Your workbench has a few small slots to hold data while you work. In x86, these are your : EAX: Your primary calculator.
To understand how it works, you have to look at the "gears" while they move. In the world of computers, those gears are and Instructions . 1. The Workbench (The CPU & Registers)
As you dig deeper, you find a "Stack"—a literal pile of data. Programs use the to remember where they were before they started a side-task. The program PUSHes its current location onto the stack.
This is your first "artifact." You realize the machine is the number 5 into the EAX slot. The next line says ADD EAX, 10 . Now you know the machine is calculating 3. The Locked Door (Control Flow)
Are you interested in or exploit development ?
By the end of your "excavation," you aren't just looking at random numbers anymore. You can see the logic, the loops, and the secrets. You’ve successfully reverse-engineered the machine’s intent without ever seeing the original blueprints. If you’d like to dive deeper, let me know:
This is a fork in the road. If the answer isn't 20, the machine "jumps" to a completely different section of code.