|
You are here |
www.honeybadger.io | ||
| | | | |
zorbash.com
|
|
| | | | | ||
| | | | |
www.mikeperham.com
|
|
| | | | | Ruby, OSS and the Internet | |
| | | | |
www.appsignal.com
|
|
| | | | | AppSignal gives you deep insights into the performance of your application's Sidekiq jobs and queues. | |
| | | | |
x0rb3l.github.io
|
|
| | | OverviewIn Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings. In this article, we will continue our analysis using IDA Pro to see if we can validate those findings as well as uncover additional functionality of the binary.IDA ProIDA or the Interactive Disassembler is a tool created by Hex-Rays that "...is capable of creating maps of their execution to show the binary instructions that are executed by the processor in a symbolic representation (assembly language)." In other words, IDA can take a compiled binary (EXE, ELF, Mach-O, etc..) and break it down into assembly level instructions which makes it easier for reverse engineers to analyze.IDA is known for its Fas... | ||