Reverse engineering
Reverse engineering
Nowadays there are various threats in the wild that want to get malware installed on victim operating systems. Most of them use some kind of social engineeri
November 09, 2012
Dejan Lukan
Reverse engineering
For part 1 of this series, please click here. Introduction [pkadzone zone="main_top"] We saw in the first article an introduction to the most comm
October 30, 2012
Soufiane Tahiri
Reverse engineering
Disclaimer This, and all upcoming parts, are made with a strict and pure educational purpose just to gain insights into dot NET programs. What you're going
October 24, 2012
Soufiane Tahiri
Reverse engineering
Overview The x86 Assembly language or ASM is the lowest-level programming language understood by human kind and one of the most primitive ones; it can b
October 15, 2012
Soufiane Tahiri
Reverse engineering
Introduction What is a « ReverseMe »? [pkadzone zone="main_top"] [pkadzone zone="main_top"] Disassembling or debugging commercial programs is usually prohib
October 03, 2012
Soufiane Tahiri
Reverse engineering
In this tutorial, we will learn how to read a packet header. It's not very common to inspect packet fields, but it is important to know how to read and inspe
September 24, 2012
Ahmed Mohamed
Reverse engineering
Some software developers are really lazy when it comes to protecting their products, and in some cases, the protection they implement (just like most "infamo
September 17, 2012
Soufiane Tahiri
Reverse engineering
If we take our predicate that we've seen in the end of part 2 into account and input at least 64 bytes (0x40) into the Key 1 field and leave the Name field a
August 31, 2012
Dejan Lukan
Reverse engineering
The First Message Box Let's start our unpacked program with OllyDbg, run it, input eight A's into the Name and Key 1 field and press CHECK STAGE 1. What happ
August 28, 2012
Dejan Lukan
Reverse engineering
This is the third article in a series on the topic of self-modifying code.
January 31, 2012
Darren Dalasta- Exam Pass Guarantee
- Live expert instruction
- Hands-on labs
- CREA exam voucher
In this series
- Kali Linux: Top 8 tools for reverse engineering
- Stacks and Heap
- Top 8 reverse engineering tools for cyber security professionals [updated 2021]
- Arrays, Structs and Linked Lists
- Reverse engineering obfuscated assemblies [updated 2019]
- Crack Me Challenge Part 4 [Updated 2019]
- Writing windows kernel mode driver [Updated 2019]
- Assembly programming with Visual Studio.NET
- The basics of IDA pro
- Reverse engineering tools
- Hacking tools: Reverse engineering
- Reverse engineering a JavaScript obfuscated dropper
- Reverse Engineering – LAB 3
- Exploiting Protostar – Stack 0-3
- Reversing Binary: Spotting Bug without Source Code
- Reverse engineering virtual machine protected binaries
- Introduction to Reverse Engineering
- Pafish (Paranoid Fish)
- Extending Debuggers
- Encrypted code reverse engineering: Bypassing obfuscation
- Buffer Overflow Attack & Defense
- Invoking Assembly Code in C#
- iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
- Hooking IDT
- A Guide to Debugging Android Binaries
- Kernel debugging with Qemu and WinDbg
- Shared Folders with Samba and Qemu
- Testing Hooks via the Windows Debugger – An Introduction to RevEngX
- Reverse Engineering with Reflector
- Applied Reverse Engineering with IDA Pro
- Injecting spyware in an EXE (code injection)
- Disassembler Mechanized Part 4: DLL Injector Development
- Disassembler Mechanized Part 3: Code Injection Operation
- Debugging TLS callbacks
- Disassembler Mechanized Part 2: Generating C# and MSIL code
- System address map initialization in x86/x64 architecture part 2: PCI express-based systems
- Coding of Disassembler
- Applied cracking & byte patching with IDA Pro
- .NET reversing with Reflexil
- Reversing firmware part 1
- Reverse Engineering with Reflector: Part 1
- Remoting Technology
- Reverse engineering with OllyDbg
- Understanding Session Fixation
- Optimizing Managed Code Execution
- File system manipulation
- The BodgeIt store part two
- The BodgeIt store part one
- Understanding Windows Internal Call Structure
- Pin: Dynamic Binary Instrumentation Framework
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!