DLL Load Order Hijacking
Introduction DLL load order hijacking is a popular technique used to force a legitimate program to load a malicious DLL file in Windows by abusing Windows’ DLL load order feature. In this article, we... Go on to the site to read the full article ... Read More
Conditionals and Jump Instructions
Introduction This article will briefly discuss conditionals and jump instructions. Conditionals are commonly used in assembly for comparison so that other instructions can make use of the output... Go on to the site to read the full article ... Read More
Switch Statements
Introduction Branching out in multiple ways, the switch statement appropriately dispenses execution to parts of code, based on the expression’s value. A switch statement is a code construct... Go on to the site to read the full article ... Read More
If Statements
Introduction “If” statements in C programming are used to execute a block of statements if a certain condition is true. They allow programmers to control the execution of code and allow user inputs... Go on to the site to read the full article ... Read More
C Code in Assembly
Introduction Reverse engineering analysts have a good grasp of C code language and how it’s converted into assembly listings. C code was designed to function as a short form of assembly language,... Go on to the site to read the full article ... Read More
Debugging for Malware Analysis
Introduction This article provides an overview of debugging and how to use some of the most commonly used debuggers. We will begin by discussing OllyDbg; using it, we will explore topics such as... Go on to the site to read the full article ... Read More
Malware Analysis and Reverse Engineering
Introduction This article provides a high-level overview of malware analysis and reverse engineering. If you are planning to get started with malware analysis and reverse engineering, this article... Go on to the site to read the full article ... Read More
Android Hacking and Security, Part 2: Content Provider Leakage
In the previous article, we discussed how an attacker exploits vulnerable Activity Components and ways to secure them. In this article, we will discuss “Content Provider Leakage.” What... Go on to the site to read the full article ... Read More