This Stack Exchange Q&A thread centers on reverse engineering, covering various aspects like disassembling binaries (ARM, x86), identifying compilers, analyzing function calls and stack frames (using IDA Pro and OllyDbg), dealing with obfuscation techniques, and working with different file formats (.so, .ipa, .exe, PDF). Discussions include using tools like radare2 and Pyew for static analysis, as well as dynamic analysis methods and anti-debugging techniques. The exchange also explores methods for analyzing malware and firmware, and the challenges involved in extracting and understanding encrypted or packed code. Finally, hardware reverse engineering using JTAG is briefly touched upon.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
3ª PARTE | 17 DIC 2025 | EL PARTIDAZO DE COPE
01 Jan 1970
El Partidazo de COPE
13:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
10:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
13:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana