Skip to main content

Malware Analysis

Advanced Malware Analysis: Static Analysis Techniques

··1333 words·7 mins
This article explores advanced static malware analysis techniques, including file format analysis, strings analysis, control flow graph reconstruction, disassembly and reverse engineering, signature-based detection, and indicators of compromise, providing practical examples and tool recommendations for professional hackers, pen testers, and red teamers.

Malware Obfuscation - Techniques and Best Practices

··1743 words·9 mins
This article delves into malware obfuscation, discussing various techniques, tools, and best practices used by red teams and penetration testers, along with real-world examples and code samples, to create evasive and resilient malware that can bypass security measures and remain undetected.

Advanced Malware Analysis: Disassembly Techniques

··3984 words·19 mins
This article provides an in-depth overview of advanced malware analysis techniques, including manual and automated disassembly, decompilers, debuggers, and dynamic binary instrumentation (DBI), with examples of tools and outputs provided for each technique.

Advanced Exploit Development: Heap Spraying Techniques

··6078 words·29 mins
This article explores advanced heap spraying techniques used by red teams and pen testers to exploit vulnerabilities in software applications, including non-ASLR and ASLR-based heap spraying, and Unicode heap spraying, with real-world examples and tools.

Exploit Development: Introduction and Techniques

··2203 words·11 mins
This article introduces and explains exploit development techniques, best practices, and examples for a technical audience of red teams and pen testers.

Dynamic Techniques for Advanced Malware Analysis

··2231 words·11 mins
This article discusses advanced malware analysis techniques focusing on dynamic analysis and provides real-world examples and code samples for techniques such as memory analysis, network monitoring, and debugging.

Ransomware: Effective Analysis and Prevention Strategies

··3909 words·19 mins
This article provides an overview of the inner workings of ransomware, analyzes real-world examples, and provides techniques for preventing and mitigating ransomware attacks.

Know Thy Enemy: Malware Analysis for Red Teams

··699 words·4 mins
To defeat the EDR, you must think like the EDR. This guide introduces malware analysis concepts specifically for Red Team operators to self-audit payloads and improve stealth.

Cracking the Code: An Advanced Introduction to Reverse Engineering

··2596 words·13 mins
A comprehensive deep-dive into the world of reverse engineering. Learn the fundamental concepts of disassembly and decompilation, master the nuances of PE and ELF file formats, understand x86/x64 assembly, and discover how to bypass anti-reverse engineering protections during advanced red team engagements.