
How Assembly works in cybersecurity? Learn about Assembly syntax, system calls, memory management, code injection, mirrored code loading, access token manipulation, and other techniques used in the hacking world. An overview of the basic concepts and tools for analyzing low-level programming and attacks.
Assembly syntax defines how instructions are written to operate the processor. Two main notations are used: AT&T and Intel.
System calls are a mechanism for interacting with the OS, allowing a program to access the file system, network, and other resources.
Registers are special memory cells in the processor used to store intermediate data and control the program.
Code in Assembly is divided into different sections, for example: .text (instructions), .data (variables), and .bss (null variables).
Processing text strings in Assembly is done using special instructions such as movsb, stosb, lodsb.
Assembly supports both integer and floating point operations, using different types of registers.
Logical operations and conditional jumps (cmp, jz, jnz) allow you to implement branching in code.
Memory access methods, including direct, indirect, indexed, and relative addressing.
In Assembly, you can open, read, and write files via system calls (open, read, write).
The stack stores data and manages function calls, while memory is managed by push, pop, and mov instructions.
A method of injecting malicious code into other people’s processes to gain control over them.
Technique for launching malicious code using the standard Windows file Rundll32.
Technique for bypassing Windows security mechanisms that protect against the execution of suspicious files.
Editing the Windows registry to change system settings or ensure the concealment of malicious code.
A method of dynamically loading malicious code without writing to disk.