Skip to content

Techno Herder

Knowledge Base for Penetration Testing

  • Home
  • Reverse Engineering

Categories

  • *nix-Based Attack (2)
  • Active Directory (1)
  • Active Reconnaissance (6)
  • Anti-Forensic Techniques (1)
  • Attack (6)
  • Blue Team (15)
  • Cloud (1)
  • Code Fortification (5)
  • Cryptography (1)
  • Customer Facing (1)
  • Database (3)
  • Hacking 101 (42)
  • Lateral Movement (1)
  • MacOS (1)
  • Mobile Penetration Testing (11)
  • Network Attack (25)
  • Network Scan & Map (4)
  • OSINT (4)
  • Pen Test Reporting (4)
  • Pentest (11)
  • Persistence Techniques (1)
  • Physical Security (1)
  • Post-Exploitation (5)
  • Reverse Engineering (2)
  • Social Engineering (3)
  • Tools (16)
  • Uncategorized (0)
  • Vulnerability Scanning (3)
  • Web App Attack (13)
  • Windows Attack (15)
  • Wireless & RF-based Attacks (3)

Category: Reverse Engineering

Decompiling .NET Executables
Hacking 101 Reverse Engineering

Decompiling .NET Executables

by Andrew Herd : January 1, 2022January 7, 2023 Leave a comment

Visual Studio Code is a free IDE that is great for debugging, compiling, and building .NET Framework applications. https://code.visualstudio.com/ Let’s use a simple C# program to demonstrate a very basic workflow for decompiling .NET executables. First, let’s use Notepad++ to create a text file on the Windows virtual machine Desktop with the following code: We […]

Decompiling Java Classes
Reverse Engineering

Decompiling Java Classes

by Andrew Herd : January 1, 2022January 2, 2023 2 Comments

While there are many tools that we could use to decompile Java bytecode (with various degrees of success), let’s checkout the JD-GUI decompiler. Java-based web applications primarily consist of compiled Java class files that are compressed into a single file, a Java ARchive, or JAR, file. Using JD-GUI, we can extract the class files and […]

Copyright © 2023 Techno Herder