Reverse engineering
Reverse engineering
Before going through this article, I highly advice you to read all previous ones in the series since I will not re-explain some techniques and re-describe so
January 23, 2013
Soufiane Tahiri
Reverse engineering
In this tutorial, we will describe the Jump Menu option in Ida Pro. Using the Jump command when analyzing an executable can prove to be a valuable trick in p
January 15, 2013
Dejan Lukan
Reverse engineering
Ida is a very good disassembler and its automatic analysis upon loading the executable is quite intense and useful, but nevertheless, it can't always be righ
January 14, 2013
Dejan Lukan
Reverse engineering
Cross references can help us determine where certain functions were called from, which can be useful for a number of reasons. Let's say that we found the fun
January 11, 2013
Dejan Lukan
Reverse engineering
Introduction After covering the basics of dot NET reverse engineering in first articles (refer to the references), it's time to go more in depth of the dot
January 08, 2013
Soufiane Tahiri
Reverse engineering
In this post, I am going to explain in detail how to go about reversing an exploit with which one can easily insert his/her own payload, providing an exploit
January 04, 2013
Anonymous
Reverse engineering
Introduction Whenever we would like to reverse-engineer a function, we need to know exactly how the function is being called: its calling convention, number
December 19, 2012
Dejan Lukan
Reverse engineering
Introduction In the first two parts, we saw some basics that will let you reverse-engineer some dot NET applications; we covered the concepts of dot NET
December 11, 2012
Soufiane Tahiri
Reverse engineering
Introduction Immunity Debugger is a debugger which is very much like Ollydbg. In this tutorial we'll present the Python API that Immunity Debugger uses for w
November 24, 2012
Dejan Lukan
Reverse engineering
Introduction Before trying to analyze any kind of malware, we need to have a proper environment set up, so we can be most efficient and collect the most info
November 12, 2012
Dejan Lukan- Exam Pass Guarantee
- Live expert instruction
- Hands-on labs
- CREA exam voucher
In this series
- Kali Linux: Top 8 tools for reverse engineering
- Stacks and Heap
- Top 8 reverse engineering tools for cyber security professionals [updated 2021]
- Arrays, Structs and Linked Lists
- Reverse engineering obfuscated assemblies [updated 2019]
- Crack Me Challenge Part 4 [Updated 2019]
- Writing windows kernel mode driver [Updated 2019]
- Assembly programming with Visual Studio.NET
- The basics of IDA pro
- Reverse engineering tools
- Hacking tools: Reverse engineering
- Reverse engineering a JavaScript obfuscated dropper
- Reverse Engineering – LAB 3
- Exploiting Protostar – Stack 0-3
- Reversing Binary: Spotting Bug without Source Code
- Reverse engineering virtual machine protected binaries
- Introduction to Reverse Engineering
- Pafish (Paranoid Fish)
- Extending Debuggers
- Encrypted code reverse engineering: Bypassing obfuscation
- Buffer Overflow Attack & Defense
- Invoking Assembly Code in C#
- iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
- Hooking IDT
- A Guide to Debugging Android Binaries
- Kernel debugging with Qemu and WinDbg
- Shared Folders with Samba and Qemu
- Testing Hooks via the Windows Debugger – An Introduction to RevEngX
- Reverse Engineering with Reflector
- Applied Reverse Engineering with IDA Pro
- Injecting spyware in an EXE (code injection)
- Disassembler Mechanized Part 4: DLL Injector Development
- Disassembler Mechanized Part 3: Code Injection Operation
- Debugging TLS callbacks
- Disassembler Mechanized Part 2: Generating C# and MSIL code
- System address map initialization in x86/x64 architecture part 2: PCI express-based systems
- Coding of Disassembler
- Applied cracking & byte patching with IDA Pro
- .NET reversing with Reflexil
- Reversing firmware part 1
- Reverse Engineering with Reflector: Part 1
- Remoting Technology
- Reverse engineering with OllyDbg
- Understanding Session Fixation
- Optimizing Managed Code Execution
- File system manipulation
- The BodgeIt store part two
- The BodgeIt store part one
- Understanding Windows Internal Call Structure
- Pin: Dynamic Binary Instrumentation Framework
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!