Start coding in ASSEMBLY (tutorial for beginners)

Поділитися
Вставка
  • Опубліковано 12 чер 2024
  • Welcome to my x86 Assembly tutorial! This video is perfect for beginners looking to dive into low-level programming. In this tutorial, we'll cover everything you need to start your journey in assembly language:
    Setup the Environment: Learn how to set up your development environment to write and test x86 assembly code.
    Registers & MOV Instruction: Understand what registers are and how to use the MOV instruction to transfer data.
    Basic Arithmetic Instructions: Master essential arithmetic instructions like ADD, SUB, MUL, DIV, and the use of square brackets for memory addressing.
    Stack Operations: Explore the stack and how to use PUSH and POP instructions.
    Labels & Flags: Learn how to use labels for marking code locations and understand flags for condition checks.
    Control Flow: Implement control flow in your code using CMP and JMP instructions.
    Loops:Build loops with assembly instructions to control your program flow.
    🖤 SUBSCRIBE 🖤
    Twitter/X:
    ▶ / _screeck
    x86 Assembly Cheat Sheet
    ▶www.scribd.com/document/21143...
    YOU have to KNOW this Windows API functions
    ▶ • YOU have to KNOW this ...
    Timestamp:
    0:00 ⏩ Intro
    0:45 ⏩ What are registers?
    3:48 ⏩Enviornment setup and basic arythmetics
    15:10 ⏩ What is a stack?
    21:06 ⏩ What are labels?
    25:35 ⏩ Writing an If statement
    32:14 ⏩ Let’s make a loop
    34:53 ⏩ Find a value in array
    41:01 ⏩ Functions
    44:43 ⏩ Practice, practice, practice
    #AssemblyLanguage #x86Assembly #Programming #LowLevelProgramming #Registers #MOVInstruction #ArithmeticInstructions #StackOperations #LogicalOperations #BitManipulation #ControlFlow #Loops #Coding #ProgrammingTutorial #BeginnerProgramming #ComputerScience #LearnAssembly
    "x86 assembly tutorial for beginners"
    "how to set up x86 assembly development environment"
    "understanding x86 registers and MOV instruction"
    "basic arithmetic instructions in x86 assembly"
    "using the stack with PUSH and POP in assembly"
    "logical operations and bit manipulation in x86 assembly"
    "working with labels and flags in assembly language"
    "control flow in x86 assembly programming"
    "writing loops in x86 assembly"
    "intro to x86 assembly language programming"
  • Наука та технологія

КОМЕНТАРІ • 24

  • @Fetrah2
    @Fetrah2 25 днів тому +4

    OMG thank you so much! this will be really helpful for me I really appreciate that!

    • @screeck
      @screeck  25 днів тому +1

      Thanks, comments like this are super motivating

  • @jakubsiekiera8098
    @jakubsiekiera8098 18 днів тому

    this guy is getting better and better with each video - incredible to see 🍿. keep up the good work 👾

  • @pedrobarthacking
    @pedrobarthacking 24 дні тому +4

    Thank you! Please continue with this assembly tutorials 👏👏

  • @stryker2k2
    @stryker2k2 21 день тому +1

    Wow! Very well done! I'm loving it!

  • @mobyhuge4339
    @mobyhuge4339 24 дні тому +1

    Hope this will be a multiple part series ‼️

  • @EnLopXf
    @EnLopXf 23 дні тому +1

    Nice I hope you have next episodes about assembly 😍😍

  • @Lewboskii
    @Lewboskii 23 дні тому +1

    tysm, i wanted to learn assembly for a while now and I did try on the past but gave up because i didn't find any resources (or didn't search enough :P) and thanks to this I can now actually write and read some basic assembly, I know it takes a very long time to make these videos but I hope you make more, subbed :)

    • @maxmuster7003
      @maxmuster7003 20 днів тому

      Search for intel developer manual for 80386.

  • @SalmanKhan-qp5gz
    @SalmanKhan-qp5gz 23 дні тому +1

    Please continue sir please

  • @maxmuster7003
    @maxmuster7003 20 днів тому

    I like to use the DosBox emulator for using the x86 assembly programming language, because DosBox emulates a PC with MS DOS 5 and in DOS there is no protection to access all hardware components directly without to get a message of a protection violation. In Windows/Linux we have to use system calls to use the hardware, but not in DOS. In DOS we can controll the hardware directly with our own executable, if we know how to do it. So in DOS we have a lot more to learn how the hardware components work together. It starts by writing directly into the screen memory and go through the point to switch the working mode of the CPU.

  • @maxmuster7003
    @maxmuster7003 20 днів тому

    Stack segment: last in first out, pointer is moving, data is going lost after popping the last value from the stack, used by calling convention
    Data segment: pointer to memory location, no data get lost, read/write access from inside and outside nested sub routines without to care where the stack pointer is

  • @maxmuster7003
    @maxmuster7003 20 днів тому

    I am on an Android tablet with a Dosbox emulator app installed and i like to use x86 assembly to create tiny executable with a little help from debug. I am not familar with an ARM CPU, but the emulation of intel 80386/80387 works fine.

  • @user-wp5en1lt8r
    @user-wp5en1lt8r 10 днів тому

    hope you take us along with you through your path of learning assembly i recently saw a video on off by one security about process injection and there was a lot of assembly in it as they open the code in gidra to see the break point and all to inject a malicious code onto a legitimate process for process hollowing i didnt understand much as i ddint know how the assembly works and how he found the break point and all

  • @maxmuster7003
    @maxmuster7003 20 днів тому

    One byte of 8 bits can divided into = 4 bits high nibble + 4 bits low nibble. And this make it easy to read some bits as hexadecimal values without to know the decimal value of the byte.
    4 bits hexadecimal
    0000 = 0
    0001 = 1
    0010 = 2
    0011 = 3
    0100 = 4
    0101 = 5
    0110 = 6
    0111 = 7
    1000 = 8
    1001 = 9
    1010 = A
    1011 = B
    1100 = C
    1101 = D
    1110 = E
    1111 = F

  • @maxmuster7003
    @maxmuster7003 20 днів тому

    Good work.

  • @hubstrangers3450
    @hubstrangers3450 24 дні тому

    Thank you ...

  • @maxmuster7003
    @maxmuster7003 20 днів тому

    mov eax, 5
    shl eax, 3 ; = shift left 3 times
    shl 1 time = multiply by 2....shl 2 times = multiply by 4.......shl 3 times = multiply by 8

  • @replikvltyoutube3727
    @replikvltyoutube3727 23 дні тому

    The keyword colouring should be adjusted for dark mode. Other than that good video, thanks

    • @screeck
      @screeck  22 дні тому +1

      I know, but i couldn't find any other good syntax highlighter

    • @replikvltyoutube3727
      @replikvltyoutube3727 22 дні тому

      @@screeck perhaps there is a json or config file located somewhere, you don't need to change whole highlighter

  • @NucleoType98
    @NucleoType98 22 дні тому +1

    suggestion: dont play with assembly, you're gonna $uck your system, at least do it within sandboxed envs

    • @maxmuster7003
      @maxmuster7003 20 днів тому

      On Windows i used the DosBox emulator to mount a folder as a drive. And inside the emulation i can read/write all files in this folder, but not the files of the host system.

  • @maxmuster7003
    @maxmuster7003 20 днів тому

    Imagine with 32 bit we can make an executable that start with decimal values attached for input with up to ten ASCII 4294967295 to convert it to 8 hexadecimal ASCII FFFFFFFF for output.