Explore >> Select a destination


You are here

www.nullpt.rs
| | x0rb3l.github.io
6.0 parsecs away

Travel
| | OverviewIn Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings. In this article, we will continue our analysis using IDA Pro to see if we can validate those findings as well as uncover additional functionality of the binary.IDA ProIDA or the Interactive Disassembler is a tool created by Hex-Rays that "...is capable of creating maps of their execution to show the binary instructions that are executed by the processor in a symbolic representation (assembly language)." In other words, IDA can take a compiled binary (EXE, ELF, Mach-O, etc..) and break it down into assembly level instructions which makes it easier for reverse engineers to analyze.IDA is known for its Fas...
| | blog.tst.sh
5.3 parsecs away

Travel
| | As you have probably guessed so far, reverse engineering its not an easy task.
| | intezer.com
6.0 parsecs away

Travel
| | Learn about the stealthy SSLoad malware and its evolving nature, how it infiltrates systems, gathers reconnaissance, and delivers payloads.
| | int10h.org
11.2 parsecs away

Travel
| Font: DOS/V re. JPN30, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles