Posts Tagged ‘reverse engineering’

Most Recent
 
Read More
2018-02-10

Malware analysis, reverse engineering and threat intelligence

Bartblaze has shared the presentation ‘Malware analysis, threat intelligence and reverse engineering’. It tells us about malware analysis (static, dynamic, sandboxes analysis), threat intelligence and reverse engineering.

 

135
 
Read More
2018-01-01

Database Reverse Engineering

Tools for database development have existed for a long time, but their application in practical design began quite recently. Today’s RE community is focused on code research. “How code works and how it handles data?”. This is the main question.

249
 
Read More
2017-08-23

Automated PCB Reverse Engineering

More and more embedded devices pervade business processes and personal activities. From a security perspective this leads to an increased attack surface and higher risk by the common utilization of devices.

 

171
 
Read More
2017-07-22

Reverse Engineering: Windows Internals

Reverse engineering of malware runs on Windows systems, since the Windows system still accounts for more than 90% of all computing systems in the world. Due to the fact that more than 90% of malicious programs are designed to compromise the Windows system, we will focus on Windows operating systems. To understand how malicious programs can use and manipulate Windows, we need to better understand the inner workings of the Windows operating system.

 

154
Latest Headlines
 
Read More
664
 
Read More
372
 
Read More
746

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics