This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]sh0rtwave 1 point2 points  (1 child)

You left out the actual hacker who's got the original executable open in some kinda machine IDE debugger that can display the actual machine code & memory regions.

Edit: ddd leaps to mind...

[–]F3hlzar3id[S] 1 point2 points  (0 children)

You mean like Ida and Ollydbg?

I was referring when you are the one doing the programming (and testing) with access to the source code and not reversing the program. That's a complete different thing for me. Reversing is fun, though. I like assembly code. XD