Malware analysis April 21, 2020 Kurt Ellzey Understanding Windows Services In order to understand the functions that Windows services perform, we need to first understand the role breakdown of Windows systems in general. Many people...
Malware analysis April 21, 2020 Kurt Ellzey Understanding Windows Registry Let’s say a user just finished installing a piece of recommended software. They weren’t really familiar with the source, but the potential benefits would...
Malware analysis April 21, 2020 Richard Azu Windows Internals for Malware Analysis This article defines Windows internals and illustrates tools which can be used to explore Windows internal systems. We’ll be defining malware and describing...
Malware analysis April 15, 2020 Pedro Tavares Lampion malware: what it is, how it works and how to prevent it | Malware spotlight The Lampion malware is spread through emails containing a link that downloads a .zip file with malicious files in it. It’s a banking Trojan: criminals developed...
Malware analysis April 9, 2020 Greg Belding Malware spotlight: Sodinokibi Ransomware is not new at this point in time and will be with us for the foreseeable future, as new types of ransomware are constantly emerging. And sometimes,...
Malware analysis March 31, 2020 Richard Azu Logical Instructions This article defines logical instructions as executed by x86 processors. It goes on to describe four key classifications of logical instructions in brief. This...
Malware analysis March 31, 2020 Richard Azu Networking Basics for Reverse Engineers This article will define network reverse engineering, list tools used by reverse engineers for reverse engineering and then highlight the network basics required...
Malware analysis March 31, 2020 Srinivas Stack Instructions This article will introduce readers to the assembly concepts in relation to the stack. We will discuss basic concepts related to stack and various registers,...
Malware analysis March 30, 2020 Srinivas Stepping Single-stepping is one of the most powerful features of a debugger, as it allows a reverse engineer to execute a single instruction at a time before returning...
Malware analysis March 26, 2020 Srinivas DLL Load Order Hijacking DLL load order hijacking is a popular technique used to force a legitimate program to load a malicious DLL file in Windows by abusing Windows’ DLL load order...