Browsed by
Tag: Security

EBX Table

EBX Table

The data in the stack are placed quite specifically. I'll try to explain to his fingers. Suppose the stack – is a table, you have at the table lies a pile of papers – data. And you need to move the paper on one sheet in the same pile on the table. Accordingly, you take one piece and put it on the table, then another piece, but the second piece you already have to put the top of the first, third over the second … and so on. Similarly, in stack data fit like each other.

And get them off the stack, too, need to reverse. Examples of work with the stack I will give in the section of the operators. (Operators) – operator is the symbolic name of the team friendly person. C Using the operators performed various memory operations. Enumerate those that need to know to cracking (after the dot-point comments will arrange for the compilation (build) the program, these comments are not taken into account): MOV – (equivalent to an assignment in high level languages), the operator will often get you to meet.

With him and entered the data in registers or variables. It captures data from the source to the receiver, when This source does not change. MOV EAX, 1; now in EAX is the number 1 MOV EBX, EAX; now and in the EAX and EBX is the number 1 MOV peremen, 15, is now in a variable peremen number 15 in the first line of EAX was receiver, and 1 – source.