Good resource for learning how to debug & reverse engineer?

Discussion on reverse-engineering and debugging.
User avatar
Posts: 10
Joined: Tue Jun 24, 2014 3:12 am

Wed Jul 16, 2014 2:31 am

xsk wrote:Step 1: Learn C/C++/Delphi etc. You can't reverse engineer if you can't forward engineer.
Step 2: Learn x86 assembly - (includes videos)
Step 3: Learn x86 architecture - (includes videos)
Step 4: Learn PE binary format - (includes videos)
Step 5: Learn about IDA & general RE thought process - ... ering.html (video pending)
Step 6: Learn about some stealth malware techniques - (includes videos)
Step 7: Learn more by encouraging other people to submit their own class material -


Can't stress enough how good this training is. Big +1
User avatar
Posts: 77
Joined: Sun Mar 14, 2010 6:07 pm

Wed Jul 16, 2014 10:46 am

IMHO, for being a good reverse engineer you, first of all, must be a good software engineer as well.
Deep and complex RE tasks it's for 70% about development of your own tools/plugins/scripts :)
User avatar
Global Moderator
Posts: 4905
Joined: Sun Mar 07, 2010 5:35 am
Location: Russian Federation

Mon Aug 04, 2014 5:11 am

Split. Question about virtual machines moved to the separate topic.
Ring0 - the source of inspiration
Posts: 1
Joined: Mon Jun 04, 2012 3:53 pm

Wed Sep 24, 2014 5:25 pm

Don't miss 'The legend of random' (no new stuff but good archive)
Posts: 97
Joined: Thu Oct 23, 2014 1:22 am

Sat Dec 06, 2014 5:27 pm

Free book that is pretty good

Dr. Fu has a nice collection of tutorials as well but it's geared more toward malware analysis ... verse.html
Posts: 3
Joined: Sat Mar 04, 2017 10:08 pm
Location: Mexico

Tue Mar 28, 2017 4:33 am

This is a Malware Analysis training developed by the students from the Rensselaer Polytechnic Institute (

Here the link to download the materials and labs:


User avatar
Posts: 11
Joined: Fri Mar 31, 2017 1:52 pm
Location: USA

Mon Apr 03, 2017 4:37 am

Sikorski, M. & Honig, A. (2012). Practical Malware Analysis : The Hands-on Guide to Dissecting Malicious Software. San Francisco: No Starch Press.

One of the best books for (user-mode) Windows reversing, with lots of hands on labs. When people ask me where to get started this is what I suggest.

Dang, B., Gazet, A., Bachaalany, E. & Josse, S. (2014). Practical Reverse Engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation. Indianapolis, IN: Wiley.

Great ASM reference, and has lots of practice problems (doing them will sharpen your skills). Windows chapter kinda outdated but has some decent background info.
Post Reply