Reverse engineering
Reverse engineering
Introduction Each DLL contains various exported functions that can be accessed by other programs. DLLs are being extensively used because the DLL is loade
May 24, 2013
Dejan Lukan
Reverse engineering
ASP.NET Configuration Options The most important configurations in the web.config file will be described in this section:[pkadzone zone="main_top"] <authe
May 23, 2013
Dejan Lukan
Reverse engineering
Introduction In the previous article we've seen that whether we're using the int 0x2e interrupt or sysenter instruction, the same method in kernel is being u
May 16, 2013
Dejan Lukan
Reverse engineering
Abstract Over the years, the Linux operating system has become more popular among the developer community due to a significant cost advantage over proprietar
May 14, 2013
Ajay Yadav
Reverse engineering
Introduction You've probably heard about Windbg before, right? It's a Windows debugger written by Microsoft that's used by developers and hackers for debuggi
May 10, 2013
Dejan Lukan
Reverse engineering
Let's present the whole PE file structure with the picture below (taken from [5]): [pkadzone zone="main_top"] At the beginning there's a DOS header, which is
May 08, 2013
Dejan Lukan
Reverse engineering
We know that when the operating system loads the executable, it will scan through its IAT table to locate the DLLs and functions the executable is using. Thi
April 24, 2013
Dejan Lukan
Reverse engineering
Example of the export directory Let's take a look at a simple example to understand how the export directory is used by the executables/libraries. Let's sup
April 18, 2013
Dejan Lukan
Reverse engineering
INTRODUCTION: In 1988, the first buffer overflow was exploited to compromise many systems. After 20 years, applications are still vulnerable, despite the eff
April 15, 2013
M G
Reverse engineering
In the previous part of the article, we've explained how to compile the Windows kernel driver. Now that we know how to compile the driver, we also have to lo
April 12, 2013
Dejan Lukan- Exam Pass Guarantee
- Live expert instruction
- Hands-on labs
- CREA exam voucher
In this series
- Kali Linux: Top 8 tools for reverse engineering
- Stacks and Heap
- Top 8 reverse engineering tools for cyber security professionals [updated 2021]
- Arrays, Structs and Linked Lists
- Reverse engineering obfuscated assemblies [updated 2019]
- Crack Me Challenge Part 4 [Updated 2019]
- Writing windows kernel mode driver [Updated 2019]
- Assembly programming with Visual Studio.NET
- The basics of IDA pro
- Reverse engineering tools
- Hacking tools: Reverse engineering
- Reverse engineering a JavaScript obfuscated dropper
- Reverse Engineering – LAB 3
- Exploiting Protostar – Stack 0-3
- Reversing Binary: Spotting Bug without Source Code
- Reverse engineering virtual machine protected binaries
- Introduction to Reverse Engineering
- Pafish (Paranoid Fish)
- Extending Debuggers
- Encrypted code reverse engineering: Bypassing obfuscation
- Buffer Overflow Attack & Defense
- Invoking Assembly Code in C#
- iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
- Hooking IDT
- A Guide to Debugging Android Binaries
- Kernel debugging with Qemu and WinDbg
- Shared Folders with Samba and Qemu
- Testing Hooks via the Windows Debugger – An Introduction to RevEngX
- Reverse Engineering with Reflector
- Applied Reverse Engineering with IDA Pro
- Injecting spyware in an EXE (code injection)
- Disassembler Mechanized Part 4: DLL Injector Development
- Disassembler Mechanized Part 3: Code Injection Operation
- Debugging TLS callbacks
- Disassembler Mechanized Part 2: Generating C# and MSIL code
- System address map initialization in x86/x64 architecture part 2: PCI express-based systems
- Coding of Disassembler
- Applied cracking & byte patching with IDA Pro
- .NET reversing with Reflexil
- Reversing firmware part 1
- Reverse Engineering with Reflector: Part 1
- Remoting Technology
- Reverse engineering with OllyDbg
- Understanding Session Fixation
- Optimizing Managed Code Execution
- File system manipulation
- The BodgeIt store part two
- The BodgeIt store part one
- Understanding Windows Internal Call Structure
- Pin: Dynamic Binary Instrumentation Framework
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!