14C: Analyze Exploit Code Flashcards
3.1 Given a scenario, research attack vectors and perform attacks on cloud technologies. 5.2 Given a scenario, analyze script or code sample for use in a penetration test.
A reverse engineering tool that converts machine code or assembly language code to code in a specfic higher-level language or pseudocode.
decompilation
The process of reviewing uncompiled source code either manually or using automated tools.
static code analysis
Reverse engineering software that converts machine language code into assembly language code.
dissembly
A dynamic testing tool used to analyze software as it executes.
debugging
Coding resources provided by a vendor to assist with development projects that use their platform or API.
software development kit (SDK)
A debugger included with Kali Linux that analyzes binary code found in 32-bit Windows applications.
ollydbg
A debugger that includes both CLIs and GUIs and that can load and modify Python scripts during runtime.
immunity debugger
An open-source debugger that works on most Unix and Windows versions, along with MacOS®.
gnu debugger (gnb)
A free debugging tool created and distributed by Microsoft for Windows operating systems.
windbg
A commercial disassembler and debugging tool with support for numerous processors and file formats. It has a limited free version.
interactive disassembler (IDA)
An open-source reverse engineering tool developed by the NSA. It has a disassembler and decompiler component and can make use of GDB and WinDbg for debugging.
ghidra
An open-source .NET framework with a focus on penetration testing but has a development and debugging component.
covenant