Reversing Malware Part 3: Symbols and Libraries
Videos from Reverse Engineering Linux 32-bit Applications
-
Reversing Malware Part 2: First Steps -
You are watching this now -
Reversing Malware Part 4: ELF Files -
Reversing Malware Part 5: Examining Sections and Segments