Reversing PCode ArgsAuthor: David Zimmer Date: 08.19.19 - 8:30pm Note: Vbdec now has its own product page Here is a quick two part video on finding an unhandled opcode that requires byte stream arguments. In the first video we: find a suitable target, discover when it is generated, recreate its use in a test project, and deduce what the bytecode args mean. In the second video we fire up the pcode debugger and watch live data to make sure our understanding is correct. FUN! Comments: (0) |
![]() ![]() About Me More Blogs Main Site
|
||||||||||||||||||||||||||||||