Reverse engineering

Analyzing malicious JavaScript

Nowadays there are various threats in the wild that want to get malware installed on victim operating systems. Most of them use some kind of social engineeri

x86 Assembly Language Applicable To Reverse Engineering: The Basics – Part 2

For part 1 of this series, please click here. Introduction [pkadzone zone="main_top"] We saw in the first article an introduction to the most comm

Demystifying Dot NET reverse engineering, part 1: Big introduction

Disclaimer This, and all upcoming parts, are made with a strict and pure educational purpose just to gain insights into dot NET programs. What you're going

x86 Assembly Language Applicable To Reverse Engineering: The Basics – Part 1

Overview The x86 Assembly language or ASM is the lowest-level programming language understood by human kind and one of the most primitive ones; it can b

Three Ways to Defeat a ReverseMe

Introduction What is a « ReverseMe »? [pkadzone zone="main_top"] [pkadzone zone="main_top"] Disassembling or debugging commercial programs is usually prohib

Manual packet analysis

In this tutorial, we will learn how to read a packet header. It's not very common to inspect packet fields, but it is important to know how to read and inspe

How to Break Simple Software Protections

Some software developers are really lazy when it comes to protecting their products, and in some cases, the protection they implement (just like most "infamo

CrackMe Challenge Part 3: The Logic Behind the First Challenge

If we take our predicate that we've seen in the end of part 2 into account and input at least 64 bytes (0x40) into the Key 1 field and leave the Name field a

CrackMe Challenge Part 2

The First Message Box Let's start our unpacked program with OllyDbg, run it, input eight A's into the Name and Key 1 field and press CHECK STAGE 1. What happ

Writing Self-Modifying Code Part 3: Antivirus Evasion

This is the third article in a series on the topic of self-modifying code.