Categorie
Hacking Tutorial

Reversing with Ida Pro and CollabREate

Tutorial By Eagle
Preview:
1 Introduction
Reverse engineering of binary programs is a very
time consuming task, often performed in a very
serialized manner. Analysts are forced to operate in this
serial fashion in large part because of the nature of the
tools they choose to use. When several analysts do
attempt to coordinate their efforts, it is usually
accomplished by sharing copies of files or through
turn taking access to a single shared work file.
cases (predominantly with text files), work files may
lend themselves to storage within a versioning system
such as CVS [4] or subversion [5]. Due to the binary
nature of most reverse engineering situations, it is no
easy task to provide any automated merging of changes
to such files.

Download Link: http://www.defcon.org/images/defcon-16/dc16-presentations/eagle-vidas/defcon-16-eagle-vidas-wp.pdf