Reverse engineering

Demystifying dot NET Reverse Engineering: Advanced Round-trip Engineering

Before going through this article, I highly advice you to read all previous ones in the series since I will not re-explain some techniques and re-describe so

IDA: Jumping, searching and comments

In this tutorial, we will describe the Jump Menu option in Ida Pro. Using the Jump command when analyzing an executable can prove to be a valuable trick in p

IDA Functions

Ida is a very good disassembler and its automatic analysis upon loading the executable is quite intense and useful, but nevertheless, it can't always be righ

IDA: Cross references / Xrefs

Cross references can help us determine where certain functions were called from, which can be useful for a number of reasons. Let's say that we found the fun

Demystifying dot NET reverse engineering: Introducing Round-trip engineering

Introduction After covering the basics of dot NET reverse engineering in first articles (refer to the references), it's time to go more in depth of the dot

Reverse Engineering a Malicious Word Document

In this post, I am going to explain in detail how to go about reversing an exploit with which one can easily insert his/her own payload, providing an exploit

Reverse-Engineering Arrays

Introduction Whenever we would like to reverse-engineer a function, we need to know exactly how the function is being called: its calling convention, number

Demystifying dot NET reverse engineering - PART 3: Advanced Byte Patching

Introduction In the first two parts, we saw some basics that will let you reverse-engineer some dot NET applications; we covered the concepts of dot NET

Analysis of Malware Samples with the Immunity Debugger API

Introduction Immunity Debugger is a debugger which is very much like Ollydbg. In this tutorial we'll present the Python API that Immunity Debugger uses for w

Environment for Malware Analysis

Introduction Before trying to analyze any kind of malware, we need to have a proper environment set up, so we can be most efficient and collect the most info