Posts

Showing posts from July, 2020

Learning of malware analysis. Solving labs from the "Recognizing C Code Constructs in Assembly" chapter from the "Practical Malware Anlysis" book

Image
Hi there! The topic of the labs is fascinating. Recognizing C code constructs in Assembly is useful in malware analysis without any doubt. Therefore I am not going to use Ghidra disassembler since I would like to improve my skills in reading Assembly code, but in the real scenario, I would probably use Ghidra + IDA stack to analyze exemplary malware more quickly. Now I'm inviting you to deep into different malware examples and maybe learn something new with me. As we all know, the best way to learn something is to do this through fun, so I wish you a lot of fun while the malware analysis process just before we start. :)

Learning of malware analysis. Advanced static analysis labs from "Practical Malware Analysis" book

Image
Hello everyone! Finally, the time has come to improve our malware analysis process with  advanced static analysis  techniques. This type of investigating malicious programs contains reverse engineering of the suspected binaries and for now on we will be able to dig deeper into analyzed malware. I must admit that I missed this aspect before and now I feel free. I'm sure that from this moment malware analysis process will be more interesting as well as challenging. Without further ado, I bring to you my solutions of the advanced static analysis lab done using reverse engineering tool called IDA. So as always I invite you to read my solutions of tasks and wish you have fun while learning new things!