Part 21 - Boot Sector Basics [Part 4]

For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/Reverse-Engineering-Tutorial

Today we continue our Boot Sector Basics. Let’s examine the code:

Part 21 - Boot Sector Basics [Part 4] - 图1

We add a string to our code as seen above and compile.

Part 21 - Boot Sector Basics [Part 4] - 图2

Let’s examine the binary in a hex editor.

Part 21 - Boot Sector Basics [Part 4] - 图3

Closely examine the above. We see our original code which we do not have to review however now we see a series of numbers, hex numbers that represent ASCII characters. We see that each letter corresponds with a letter. When we say that ultimately everything goes down to 0 and 1 this is a proof of concept. As you can see EB is selected above and we can see those hex values ultimately go to 11101011 in binary.

Homework: Google and research the ASCII conversion table and do some research on your own and better understand how hex values represent characters.

Next week we take it to the next level. Stay tuned!