Reversing : The Hacker's Guide to Reverse Engineering

(ff) #1
Figure C.2 Logical and in-memory arrangement of a singly linked list.

Item 1

Item 2

Item 3

Item 1 Data Memory
Item 1 Next Pointer

Item 2 Data
Item 2 Next Pointer

Item 3 Data
Item 3 Next Pointer

In Memory - Arbitrary Order

Logical Arrangement

Deciphering Program Data 551

23_574817 appc.qxd 3/16/05 8:45 PM Page 551

Free download pdf