Introduction To: X86 Disassembly

You look through a digital microscope (a like IDA Pro or Ghidra). You see a sequence of hex numbers: B8 05 00 00 00 . The disassembler translates this into: MOV EAX, 5

As you dig deeper, you find a "Stack"—a literal pile of data. Programs use the to remember where they were before they started a side-task. The program PUSHes its current location onto the stack.

Suddenly, you hit a line that says CMP EAX, 20 followed by JNE 0x401050 . The machine is checking if your total is 20. Introduction to x86 disassembly

This is how a program makes a decision—like checking if a password is correct. If the numbers don't match, the "jump" sends you to an "Access Denied" screen. 4. The Hidden Vault (The Stack)

This is your first "artifact." You realize the machine is the number 5 into the EAX slot. The next line says ADD EAX, 10 . Now you know the machine is calculating 3. The Locked Door (Control Flow) You look through a digital microscope (a like

Imagine you are a . You’ve just discovered a strange, ancient-looking machine in a high-tech bunker. It’s still running, but there are no manuals, no source code, and no labels on the buttons.

This is a fork in the road. If the answer isn't 20, the machine "jumps" to a completely different section of code. Programs use the to remember where they were

Should I explain the difference between and x64 (64-bit) ?

You look through a digital microscope (a like IDA Pro or Ghidra). You see a sequence of hex numbers: B8 05 00 00 00 . The disassembler translates this into: MOV EAX, 5

As you dig deeper, you find a "Stack"—a literal pile of data. Programs use the to remember where they were before they started a side-task. The program PUSHes its current location onto the stack.

Suddenly, you hit a line that says CMP EAX, 20 followed by JNE 0x401050 . The machine is checking if your total is 20.

This is how a program makes a decision—like checking if a password is correct. If the numbers don't match, the "jump" sends you to an "Access Denied" screen. 4. The Hidden Vault (The Stack)

This is your first "artifact." You realize the machine is the number 5 into the EAX slot. The next line says ADD EAX, 10 . Now you know the machine is calculating 3. The Locked Door (Control Flow)

Imagine you are a . You’ve just discovered a strange, ancient-looking machine in a high-tech bunker. It’s still running, but there are no manuals, no source code, and no labels on the buttons.

This is a fork in the road. If the answer isn't 20, the machine "jumps" to a completely different section of code.

Should I explain the difference between and x64 (64-bit) ?