Reverse engineering

Hacking tools: Reverse engineering

Reverse engineering refers to the duplication of another producer's product following a thorough examination of its construction or composition. It involves

Reverse engineering a JavaScript obfuscated dropper

Nowadays one of the techniques most used to spread malware on windows systems is using a JavaScript (js) dropper. A js dropper represents, in most attack sce

Reverse Engineering – LAB 3

Software: IDA Pro Free (v 5.0) DLL Name: Test.dll[pkadzone zone="main_top"] Story about DLL: This DLL is reportedly scanning the system for running the proc

Exploiting Protostar – Stack 0-3

In this article, we will be reverse engineering and exploiting simple C programs from Protostar VM by exploit-exercises.com. We will be mainly focusing at ho

Reversing Binary: Spotting Bug without Source Code

Abstract The proficiency to unravel the complexities of a target software is called reverse engineering or just reversing. Software attackers manipulate or b

Reverse engineering virtual machine protected binaries

In code obfuscation, a virtual machine is a mechanism used to execute a different instruction set than the one used by machine that runs the program. For exa

Introduction to Reverse Engineering

In computing, reverse engineering is the process of understanding how things work and reusing the information to do something. This is applicable even to And

Pafish (Paranoid Fish)

Introduction In this tutorial we'll take a look at a Pafish tool, which performs anti debugger/vm/sandbox tricks to detect whether the malware is being execu

Extending Debuggers

Sometimes we come across situations when we are in need of doing something inside our debuggers or to extend the functionality of them. For such things, debu

Encrypted code reverse engineering: Bypassing obfuscation

Obfuscation is a distinctive mechanism equivalent to hiding, often applied by security developers, to harden or protect the source code (which is deemed as i