Reverse Engineering

Solving the November 13th Detective Nevil Mystery Challenge

Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”.  On November 13th…

3 days ago

Not-So-Random: Using LD_PRELOAD to Hijack the rand() Function

Today I wanted to continue the series on using LD_PRELOAD.  In today’s post we are going to use LD_PRELOAD to…

1 month ago

LD_PRELOAD – Introduction

Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is…

2 months ago

A Malware Researcher’s Guide to Reversing Maze Ransomware

At the end of May 2019, a new family of ransomware called Maze emerged into the gaping void left by…

8 months ago

Video: All Things CTF!

Find Fame, Fortune and Fun with CTFs! Video and Slide Deck from EH-Net Live! November 2019 Games are fun. They’re…

1 year ago

Webinar: All Things CTF!

Register Now to Find Fame, Fortune and Fun with CTFs! Capture the Flag is a game that can teach valuable…

1 year ago

Reverse Engineering Intellectual Property: Chip Ptychographic X-ray Laminography

Image Credit: Paul Scherrer Institute - Ptychographic X-ray Laminography via Samuel K. Moore - writing for IEEE Spectrum Magazine -…

1 year ago

Book Review: Malware Data Science

“Malware Data Science: Attack Detection and Attribution” (MDS) is a book every information security professional should consider reading due to…

2 years ago

Crack Me Challenge Part 4

First we must take a look at the following piece of code that will be presented in the code segment…

2 years ago

Reversing malware in a custom format: Hidden Bee elements

When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing…

2 years ago