Explaining Assembly Language Technology: Retrieving and Formatting Readable Time in Kernel Drivers

Explaining Assembly Language Technology: Retrieving and Formatting Readable Time in Kernel Drivers

Core API for Time Retrieval and Conversion Key Data Structures ; TIME_FIELDS structure definition TIME_FIELDS STRUCT Year WORD ? ; Year (1601-30827) Month WORD ? ; Month (1-12) Day WORD ? ; Day (1-31) Hour WORD ? ; Hour (0-23) Minute WORD ? ; Minute (0-59) Second WORD ? ; Second (0-59) Milliseconds WORD ? … Read more

Analysis of Answer to Checkpoint 10.3 in Assembly Language

Analysis of Answer to Checkpoint 10.3 in Assembly Language

“Assembly Language”, 3rd Edition by Wang Shuang Chapter 10: CALL and RET Instructions Checkpoint 10.3 (Page 193) What is the value in ax after executing the following program? Memory Address Machine Code Assembly Instruction 1000:0 b8 00 00 mov ax, 0 1000:3 9A 09 00 00 10 call far ptr s 1000:8 40 inc ax … Read more

Fundamentals of Assembly Language Security Techniques

Fundamentals of Assembly Language Security Techniques

Overview of Traditional Security Techniques This section will introduce some traditional, fundamental yet effective assembly language security techniques, rather than cutting-edge rootkits or virus/antivirus technologies. This foundational knowledge is crucial for understanding modern security mechanisms. Basic Concepts of Viruses and Trojans In the realm of traditional security, the distinctions between viruses and trojans are as … Read more

Explaining Assembly Language Technology: Principles of Integrity Verification Based on Hash Algorithms

Explaining Assembly Language Technology: Principles of Integrity Verification Based on Hash Algorithms

Application of Hash Algorithms in Security Hash algorithms are the core technology for verifying file integrity, where the fundamental principle is to compute a fixed-length digest value (such as MD5) from the file content to establish a “digital fingerprint” of the file. This section will detail how to implement an integrity verification mechanism based on … Read more

Assembly Language: Chapter 4 – The First Complete Assembly Program

Assembly Language: Chapter 4 - The First Complete Assembly Program

This series will explain the book “Assembly Language”. This section covers Chapter 4 – The First Complete Assembly Program. We can finally write our first complete program. Previously, we were writing some instructions in Debug and executing them there. Now we will start writing a complete assembly language program, using <span>compilation</span> and <span>linking</span> to compile … Read more

The Root ‘Multi-‘: Exploring the Semantic World of ‘Many’ and the Charm of Language

The Root 'Multi-': Exploring the Semantic World of 'Many' and the Charm of Language

In the vast ocean of English vocabulary, the Latin root “multi-” shines like a brilliant pearl, carrying the core meanings of “many,” “rich,” and “complex.” It originates from the Latin word multus (meaning “many” or “a lot”), and has evolved over thousands of years to become an important cornerstone in the construction of modern English … Read more

Assembly Language: Chapter 1 – Basic Hardware Knowledge

Assembly Language: Chapter 1 - Basic Hardware Knowledge

This series will explain the book “Assembly Language”. This section covers Chapter 1 – Basic Hardware Knowledge. Overview of This Section 1. Machine Language and Assembly Language 2. Components of Assembly Language 3. Instructions and Data 4. Memory Units 5. CPU Read/Write Operations on Memory (Three Lines) 6. Transmission of Address, Data, and Control Information … Read more

Assembly Language Day 06

Assembly Language Day 06

0x00 This section is dedicated to daily learning and note sharing to help everyone learn assembly language. Why learn assembly language? Because in red-blue confrontations, our tools are often detected and killed by some AV/EDR. Therefore, we need to counter AV, which is the evasion technique. To learn evasion techniques, we must start from the … Read more