Sept. 1, 2023, 6 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

In this video, part of a 3 video series, we'll look at what a basic structure is, discuss how it uses memory and use a sample program to create a compiled binary for reverse engineering. We'll then use IDA Pro to analyze the code and identify signs of structure usage. This video will cover the use of dynamically allocated memory used for this structure. We'll also cover structure analysis using IDA's decompiler. Finally, we'll create a custom structure and discuss …

basic basics binary code discuss engineering ida ida pro identify memory pro program reverse reverse engineering sample series video

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India

Cyber Program Manager - CISO- United States – Remote

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Network Security Engineer (AEGIS)

@ Peraton | Virginia Beach, VA, United States

SC2022-002065 Cyber Security Incident Responder (NS) - MON 13 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Information Systems Security Engineer

@ Booz Allen Hamilton | USA, GA, Warner Robins (300 Park Pl Dr)