DLL Load Order Hijacking

Introduction DLL load order hijacking is a popular technique used to force a legitimate program to load a malicious DLL file in Windows by abusing Windows’ DLL load order feature. In this article, we... Go on to the site to read the full article ... Read More

Conditionals and Jump Instructions

Introduction This article will briefly discuss conditionals and jump instructions. Conditionals are commonly used in assembly for comparison so that other instructions can make use of the output... Go on to the site to read the full article ... Read More
Loops

Loops

| | Loops
Introduction In the previous article, we discussed how if statements can be spotted in the disassembly of a binary. We learned that if conditions are translated to conditional jumps when exploring... Go on to the site to read the full article ... Read More

Switch Statements

| | Switch Statements
Introduction Branching out in multiple ways, the switch statement appropriately dispenses execution to parts of code, based on the expression’s value. A switch statement is a code construct... Go on to the site to read the full article ... Read More

If Statements

| | If Statements
Introduction “If” statements in C programming are used to execute a block of statements if a certain condition is true. They allow programmers to control the execution of code and allow user inputs... Go on to the site to read the full article ... Read More

Variables

| | Variables
Introduction Variables in C are data storage units that reserve space in the memory. There are different types of variables. Each type requires different amounts of memory, but the memory... Go on to the site to read the full article ... Read More
C Code in Assembly

C Code in Assembly

| | C Code in Assembly
Introduction Reverse engineering analysts have a good grasp of C code language and how it’s converted into assembly listings. C code was designed to function as a short form of assembly language,... Go on to the site to read the full article ... Read More
Debugging for Malware Analysis

Debugging for Malware Analysis

Introduction This article provides an overview of debugging and how to use some of the most commonly used debuggers. We will begin by discussing OllyDbg; using it, we will explore topics such as... Go on to the site to read the full article ... Read More

Malware Analysis and Reverse Engineering

Introduction This article provides a high-level overview of malware analysis and reverse engineering. If you are planning to get started with malware analysis and reverse engineering, this article... Go on to the site to read the full article ... Read More
Android Hacking and Security, Part 2: Content Provider Leakage

Android Hacking and Security, Part 2: Content Provider Leakage

| | feature, Hacking
In the previous article, we discussed how an attacker exploits vulnerable Activity Components and ways to secure them. In this article, we will discuss “Content Provider Leakage.” What... Go on to the site to read the full article ... Read More