Bartblaze has shared the presentation ‘Malware analysis, threat intelligence and reverse engineering’. It tells us about malware analysis (static, dynamic, sandboxes analysis), threat intelligence and reverse engineering.
Tools for database development have existed for a long time, but their application in practical design began quite recently. Today’s RE community is focused on code research. “How code works and how it handles data?”. This is the main question.
More and more embedded devices pervade business processes and personal activities. From a security perspective this leads to an increased attack surface and higher risk by the common utilization of devices.
Reverse engineering of malware runs on Windows systems, since the Windows system still accounts for more than 90% of all computing systems in the world. Due to the fact that more than 90% of malicious programs are designed to compromise the Windows system, we will focus on Windows operating systems. To understand how malicious programs can use and manipulate Windows, we need to better understand the inner workings of the Windows operating system.