Reverse engineering

Injecting spyware in an EXE (code injection)

Implanting malicious code in the form of spyware to an existing running process is one of the more sophisticated tasks. Before the advent of disassembler or

Disassembler Mechanized Part 4: DLL Injector Development

Introduction We have already presented a couple of papers on modifying binaries through IDA Pro and OllyDbg disassembler, where we added functionality to an

Disassembler Mechanized Part 3: Code Injection Operation

Introduction This article is a continuation of the previous effort of writing the "Disassembler-Mechanized" series, in which we are showing the process of de

Debugging TLS callbacks

TLS (thread local storage) calls are subroutines that are executed before the entry point . There is a section in the PE header that describes the place of a

Disassembler Mechanized Part 2: Generating C# and MSIL code

Introduction In the previous papers, we have showcased the essential configuration in terms of external DLL importing into the solution and NuGet package ins

System address map initialization in x86/x64 architecture part 2: PCI express-based systems

This article is the second part of a series that clarifies PCI expansion ROM address mapping to the system address map. The mapping was not sufficiently cove

Coding of Disassembler

We have practiced much disassembling by using assembly de-compilation tools such as Reflector, ILSpy, etc. Although such tools offer many advantages and are

Applied cracking & byte patching with IDA Pro

In the previous IDA Pro article, we took a look at the basics of reverse engineering source code and binary files. This rare dissertation committed to impart

.NET reversing with Reflexil

Technically speaking a .NET built software or component (DLL) resembles an executable assembly. That's because it's compiled in MSIL, and you can usually vie

Reversing firmware part 1

The article will explore various strategies for reversing firmware, with some examples. Finally, some best practices are mentioned. Embedded systems and f