A detailed exploration of the Windows Portable Executable (PE) format through hands-on reverse engineering. The author analyzes a .NET executable compiled with Mono, examining the DOS header, PE signature, COFF header, and section tables. The goal is to understand PE structure well enough to generate .NET executables directly from a custom compiler, bypassing intermediate language assembly. The session covers binary parsing techniques, file format specifications, and practical implementation using C programming with debugging tools.
•4h 6m watch time
Sort: