In most cases, this will mean starting with some system monitoring tools to determine what kinds of files and other resources the program accesses.Ī notable exception is if the program is primarily a network program, in which case you may want to skip straight to packet sniffing.) Windows doesnt come with any tools of this sort, so we have to go to a third party to get them.Īll you need to know here is that these tools will allow you to monitor a running program (or programs) to see what files are being accessed, whether a program is reading or writing, where in the file it is, and what other files its looking for. Generally, you will want to start at a high level and work your way down. However, the methods used to reverse engineer are similar in most instances.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |