Welcome to the Assembly Language Primer for Windows series! We have already covered a lot of Assembly language basics for the Linux Platform in our Assembly Language Primer for Hackers
. In this video series, we will concentrate on learning Assembly Language for the Windows Platform. However, please note that the previous video series is a prerequisite for this one. We will use a lot of learning in this video series for our Metasploit Megaprimer and the Scenario Based Hacking series.
In Part 1, we will look at the different processor modes - Real, Protected, Virtual 8086, SMM etc., then we will understand the different memory models - Flat and Segmented, and how they apply to Real and Protected mode. We will then look at the key differences between the AT&T and Intel syntax for assembly. Once we have understood all these basics, we will code a "Hello World" program which will run in real mode, using 16 bit assembly and assemble it using the Debug program which ships by default with Windows.
Leave your comments behind and let me know what you think! :)
Tags: basics ,
Latest from the SecurityTube Blog:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.