Reverse Engineering

Reverse Engineering

PE File Infection

The following paper paperwork a potential PE file an infection method which covers a excessive stage overview and the low stage code of how...

A Simple Demonstration on Malware Analysis

Pre-requisites for this materials: Knowledge of the WinAPI Knowledge of the PE file format (non-compulsory) Knowledge of Windows memory (non-compulsory) Basic data of C/C++ Basic data of x86 Intel...

Reverse Engineering a JavaScript Obfuscated Dropper

1. Introduction Nowadays one of many methods most used to unfold malware on home windows programs is utilizing a JavaScript (js) dropper. A js dropper...

TDSS part 3: Bootkit on the Other Foot

Introduction In this remaining article on this collection, we'll describe the means of loading the bootkit beforehand mentioned in “TDSS part 1: the x64 Dollar...

Writing Self-Modifying Code Part 3: Antivirus Evasion

This is the third article in a sequence on the subject of self-modifying code. Part 1 is right here: Writing Self-Modifying Code Part 1: C...

Petya Ransomware Initial Analysis

The doc under is an preliminary degree evaluation of the current Petya Ransomware (2017). We can even talk about an evaluation of a dll...

Malware: Types & Analysis

This put up is a group of some articles divided in 3 sections (posted right here as a reminder priceless for any cyber security...

Popular Articles

How to Find Reflected Cross Site Scripting Vulnerability

In our earlier tutorial, now we have realized about Reflected Cross Site Scripting and three fundamental steps to establish and detect Reflected Cross Site...