Calling Conventions For Reverse Engineering

Subscribers:
138,000
Published on ● Video Link: https://www.youtube.com/watch?v=VKp4FvLWjbk



Duration: 9:25
5,100 views
0


πŸ”₯ Learn How Calling Conventions Work For Reverse Engineering & Game Hacking
πŸ‘¨β€πŸ’» Buy Our Courses: https://guidedhacking.com/register/
πŸ’° Donate on Patreon: https://patreon.com/guidedhacking
❀️ Follow us on Social Media: https://linktr.ee/guidedhacking

πŸ”— Learn More: https://guidedhacking.com/threads/calling-conventions-for-reverse-engineering.20586/

❀️ Thank You to Malcore: https://link.malcore.io/redirect/guidedhacking

πŸ‘¨β€πŸ’» Script & Visuals by rexir: https://guidedhacking.com/members/280340/
πŸ‘©β€πŸ’» Narration by wahsami: https://guidedhacking.com/members/wahsami.278740/

πŸ“œ Video Description:
Today we're going to explore the low level world of calling conventions, which are essentially the guidelines that dictate how function arguments are passed. Understanding calling conventions is key to comprehending assembly code, especially when you're involved in reverse engineering tasks. It's important to recognize how the stack operates, growing and shrinking through various push and pop instructions. Remember, the stack is just one segment within a process's memory, with others like the heap, code, and data sections playing their pivotal roles.

As a foundational concept, the function prologue sets the stage for a better comprehension of calling conventions. Think of the prologue as a routine that preps the system for the task ahead, ensuring that once the function is called, everything operates seamlessly. We'll also explore different calling conventionsβ€”cdecl, stdcall, and fastcallβ€”each with its unique mechanism for managing arguments and maintaining system stability. Furthermore, learning about these conventions will illuminate the cleanup processes and the distinctions between caller and callee cleanups. Let's not forget our sponsor, Malcore.io, who has greatly simplified the process of scanning files for unknown threats with their innovative online malware analysis tools.

πŸ“ Timestamps:
00:00 Intro to Calling Conventions
00:16 Stack Mechanics
01:16 Malcore Is Dank
02:17 Function Prologue
03:00 cdecl calling convention
04:01 AddNum Example
05:00 cdecl Cleanup
05:30 stdcall
06:01 FastCall Variants
07:28 Microsoft FastCall
07:47 thiscall Convention

✏️ Tags:
#reverseengineering #gamehacking #malwareanalysis
thiscall calling convention
cdecl calling convention
calling convention x64
reverse engineering
x64 calling convention
x86 calling convention
calling convention
x86 calling conventions
calling convention x86
reverse engineering
x86-64 calling convention
c++ calling conventions
c++ calling convention
fastcall calling convention
stdcall calling convention
reverse engineering
windows calling convention
calling conventions
function calling convention
calling conventions c++







Tags:
thiscall calling convention
cdecl calling convention
calling convention x64
x64 calling convention
x86 calling convention
calling convention
x86 calling conventions
calling convention x86
x86-64 calling convention
c++ calling conventions
c++ calling convention
fastcall calling convention
stdcall calling convention
windows calling convention
calling conventions
go calling convention
function calling convention
reverse engineering
calling conventions c++