MENU

Posts Tagged ‘reverse engineering’

Most Recent
 
Read More
2018-02-10

Malware analysis, reverse engineering and threat intelligence

Bartblaze has shared the presentation ‘Malware analysis, threat intelligence and reverse engineering’. It tells us about malware analysis (static, dynamic, sandboxes analysis), threat intelligence and reverse engineering.

 

145
 
Read More
2018-01-01

Database Reverse Engineering

Tools for database development have existed for a long time, but their application in practical design began quite recently. Today’s RE community is focused on code research. “How code works and how it handles data?”. This is the main question.

270
 
Read More
2017-08-23

Automated PCB Reverse Engineering

More and more embedded devices pervade business processes and personal activities. From a security perspective this leads to an increased attack surface and higher risk by the common utilization of devices.

 

191
 
Read More
2017-07-22

Reverse Engineering: Windows Internals

Reverse engineering of malware runs on Windows systems, since the Windows system still accounts for more than 90% of all computing systems in the world. Due to the fact that more than 90% of malicious programs are designed to compromise the Windows system, we will focus on Windows operating systems. To understand how malicious programs can use and manipulate Windows, we need to better understand the inner workings of the Windows operating system.

 

183
Latest Headlines
 
Read More
800
 
Read More
419
 
Read More
828

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics