Reverse Engineering

Reverse Engineering

Analysis of Malicious Documents-Part 3

In the last part of the article series, we have seen some handy options of OfficeMalScanner like debug, scan, brute, etc.; learned about structures...

Analysis of Malicious Documents-Part 2

In the previous part of this article series, we have seen some basics and initial concepts around analyzing Malicious files. In this part of...

Analysis of Malicious Documents-Part 1

Spreading of malware through malicious documents is not new but considering how malware authors use different techniques has become challenging for malware analysts to...

Kernel Exploitation-Part 2

In Part-1 of this article series, we had reverse engineered the driver and identified buffer overflow vulnerability in it. In this part, we will...

.NET malware: De-obfuscation, decryption and debugging – tips and tricks

There are an a variety of benefits to .NET-written malware from a malware author’s perspective. You can goal a number of platforms (x32, x64) with...

Collection of Anti-Malware Analysis Tricks

This is a small device I wrote whereas reversing some malwares. It performs a bunch of these days malwares tips and the objective is...

Uncovering cross-process injection with Windows Defender ATP

Windows Defender Advanced Threat Protection (Windows Defender ATP) is a post-breach answer that alerts security operations (SecOps) personnel about hostile exercise. As the character...

Popular Articles

How to Find Reflected Cross Site Scripting Vulnerability

In our earlier tutorial, now we have realized about Reflected Cross Site Scripting and three fundamental steps to establish and detect Reflected Cross Site...