paint-brush
A Guide to Examining & Modifying Executable Codeby@ranuzz
210 reads

A Guide to Examining & Modifying Executable Code

by Shekhar Chandra8mAugust 6th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

C has been working with C all of my professional and student life. There have been times when I had to look a little deeper to understand what is going on with my buggy program. The idea here is to examine the executable this program creates. Find out where the code I wrote lands in the executable and what compiler adds on top of it. Later I'll showcase some basic reverse engineering that can be done by pretending we haven't seen the code. The tools used to do analysis and their output are listed at the bottom of this post for reference.

Company Mentioned

Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - A Guide to Examining & Modifying Executable Code
Shekhar Chandra HackerNoon profile picture
Shekhar Chandra

Shekhar Chandra

@ranuzz

Indie Developer working on multiple side projects

About @ranuzz
LEARN MORE ABOUT @RANUZZ'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Shekhar Chandra HackerNoon profile picture
Shekhar Chandra@ranuzz
Indie Developer working on multiple side projects

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here