


How you choose the goal doesn't matter, but I picked this one because I am familiar with H.264 in RDP through my work in the FreeRDP project. In this article, our goal will be to identify secret registry keys affecting the RDP H.264 video encoder. This may sound obvious, but rather than poke around random binaries, it is a good thing to start with a goal in mind. I have used a clean Windows Server 2019 virtual machine for this project. While I have access to IDA Pro at work, all the screenshots were taken using IDA Free to avoid confusion.Ī Windows machine with RDP enabled is recommended to follow all the steps, but it is possible to do some of the tasks from another platform if necessary. Please note that this specific edition of IDA is not suitable for commercial use, but since this guide is meant as an introduction, it shouldn't be an issue. Prerequisitesĭownload and install IDA Free. Instead of focusing on the final result, the steps include detailed screenshots and comments to show the complete thought process. The goal of this blog post is to show how anyone can perform simple reverse engineering tasks using nothing more than logical deduction and the right set of tools. Luckily for us, IDA Free now includes an 圆4 decompiler, which makes reversing possible without assembly language skills. While free or cheaper alternatives like Ghidra are gaining in popularity, they are no match for IDA's decompiler in terms of accuracy and maturity. IDA is a state-of-the-art reverse engineering tool commonly used in the software industry to analyze closed-source binaries.
