877.791.9571 |

About the Author:

Kyriakos has a BSc in Computer Science and an MSc in Information Security. Deeply interested in the analysis and the reverse engineering of commercial/custom packers and software protections for the last 6 years, he was a speaker in Athcon 2011 and also the author of the Reversing Challenges for 2011 and 2012 for Athcon conference. Except from taking them apart, he also has a deep interest in studying anti-reversing tricks and creating his own custom tricks that go from simple debugger detection to custom obfuscation and other anti-analysis mechanisms for the sake of imagination and creativity. More recently, he has moved into the area of malware research/analysis at Sophos as a Thread Researcher. Kyriakos spends some of his free time developing his own reversing tools, as well as experimenting with C++ and Asm.
malware

Reversing Malware Loaders – The Matsnu-A Case Part 2

,

In the last installment, we examined the PEB Loader Data Structure. We take up the discussion here.
Locate and Isolate the Embedded Decrypted Executable

Once the VAs of the necessary APIs […]

hackers-hacking-hacks

Reversing Malware Loaders – The Matsnu-A Case

The AV industry is growing every day along with the underground industry that produces all types of malware from simple file infectors to more sophisticated Trojan types that are […]

iobit-security-360

IObit Protected Folder Authentication Bypass

,

Acknowledgements
I would like to dedicate this article to all my friends, they know who they are, and to Irene, for her love and support.
Intro

From time to time I come […]