I imagine this sort of reverse engineering is common for malware analysts and people who work in the AV/security industry.
Personally I work at a software security shop, where we aim to prevent this sort of reverse engineering. So we also end up doing a lot of this to be familiar with attacks, test our own protection, debug issues etc...
If people want to learn more about this kind of stuff, tuts4you is great:
https://tuts4you.com/
Personally I work at a software security shop, where we aim to prevent this sort of reverse engineering. So we also end up doing a lot of this to be familiar with attacks, test our own protection, debug issues etc...
If people want to learn more about this kind of stuff, tuts4you is great: https://tuts4you.com/
Specifically, the lena151 tutorials are great for beginners with 0 experience: https://tuts4you.com/download.php?list.17