Reverse Engineering x64 for Beginners - Windows - Checkmate
https://niiconsulting.com/checkmate/2018/04/reverse-engineering-x64-for-beginners-windows/
Once you have compiled the binary, let’s load it up in x64dbg. Remember, that our binary accepts an argument which is our password. So, unlike GDB where we can supply the argument inside the GDB; in Windows, we will have to supply it during the loading of binary via the command line itself. To load the binary into x64dbg, below is the commandline y...
Once you have compiled the binary, let’s load it up in x64dbg. Remember, that our binary accepts an argument which is our password. So, unlike GDB where we can supply the argument inside the GDB; in Windows, we will have to supply it during the loading of binary via the command line itself. To load the binary into x64dbg, below is the commandline y...
DA: 70 PA: 49 MOZ Rank: 28