Reverse engineering
Reverse engineering
Introduction In this article we'll take a look at all the optimizations the compilers use to assembly the high-level switch statements into their assembly re
February 27, 2013
Dejan Lukan
Reverse engineering
It's often the case that we need to debug a kernel application, like device driverS, system calls, interrupt routines, or some other kernel application. In t
February 26, 2013
Dejan Lukan
Reverse engineering
Introduction So far we've taken a look at the obfuscation routine and how it deobfuscates the instructions in the loc_4033D1. At the beginning point, the ove
February 25, 2013
Dejan Lukan
Reverse engineering
Introduction Every program nowdays contains branch statements where the decision making happens and loops where we're repeating some piece of code. Obviously
February 21, 2013
Dejan Lukan
Reverse engineering
It's not a rare occurrence when we want to load a binary executable in a debugger, change some bytes and then save the changed binary to a hard drive, making
February 20, 2013
Dejan Lukan
Reverse engineering
We know that there are two ways of disassembling a binary executable into its assembler instructions. The first technique is linear sweep algorithm and the s
February 18, 2013
Dejan Lukan
Reverse engineering
In the previous tutorial, we've talked about techniques that harden the reverse engineering of the executable and then we looked at anti-debugging techniques
February 14, 2013
Dejan Lukan
Reverse engineering
This article is an introduction of packing, how to unpack, to reverse an exe and finally patching it. I have chosen to show reversing of a sample exe file an
February 13, 2013
Ninj@S3c
Reverse engineering
Configuration Files We know that some of the Ida's settings are saved in the .idb archive database files, but are not actually persisted across global Ida se
February 11, 2013
Dejan Lukan
Reverse engineering
In this article, we won't be going too deep into Ida scripting. Instead, we'll present what an IDC is and how it can be used to enhance the capabilities of I
February 08, 2013
Dejan Lukan- Exam Pass Guarantee
- Live expert instruction
- Hands-on labs
- CREA exam voucher
In this series
- Kali Linux: Top 8 tools for reverse engineering
- Stacks and Heap
- Top 8 reverse engineering tools for cyber security professionals [updated 2021]
- Arrays, Structs and Linked Lists
- Reverse engineering obfuscated assemblies [updated 2019]
- Crack Me Challenge Part 4 [Updated 2019]
- Writing windows kernel mode driver [Updated 2019]
- Assembly programming with Visual Studio.NET
- The basics of IDA pro
- Reverse engineering tools
- Hacking tools: Reverse engineering
- Reverse engineering a JavaScript obfuscated dropper
- Reverse Engineering – LAB 3
- Exploiting Protostar – Stack 0-3
- Reversing Binary: Spotting Bug without Source Code
- Reverse engineering virtual machine protected binaries
- Introduction to Reverse Engineering
- Pafish (Paranoid Fish)
- Extending Debuggers
- Encrypted code reverse engineering: Bypassing obfuscation
- Buffer Overflow Attack & Defense
- Invoking Assembly Code in C#
- iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
- Hooking IDT
- A Guide to Debugging Android Binaries
- Kernel debugging with Qemu and WinDbg
- Shared Folders with Samba and Qemu
- Testing Hooks via the Windows Debugger – An Introduction to RevEngX
- Reverse Engineering with Reflector
- Applied Reverse Engineering with IDA Pro
- Injecting spyware in an EXE (code injection)
- Disassembler Mechanized Part 4: DLL Injector Development
- Disassembler Mechanized Part 3: Code Injection Operation
- Debugging TLS callbacks
- Disassembler Mechanized Part 2: Generating C# and MSIL code
- System address map initialization in x86/x64 architecture part 2: PCI express-based systems
- Coding of Disassembler
- Applied cracking & byte patching with IDA Pro
- .NET reversing with Reflexil
- Reversing firmware part 1
- Reverse Engineering with Reflector: Part 1
- Remoting Technology
- Reverse engineering with OllyDbg
- Understanding Session Fixation
- Optimizing Managed Code Execution
- File system manipulation
- The BodgeIt store part two
- The BodgeIt store part one
- Understanding Windows Internal Call Structure
- Pin: Dynamic Binary Instrumentation Framework
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!