profile photo of Zhassulan Zhussupov

Zhassulan Zhussupov

Cybersecurity enthusiast | CTF player | R&D Engineer | Jiu-Jitsu Practicioner

Static malware analysis: Office documents

Hello and welcome back to a new practical case: analyze office documents. In our case, we are going to start looking at how to analyze Microsoft Office documents.

Malware Analysis example. Classic case: Stuxnet. Part 2

In this part 2 of our reverse engineering article of the stuxnet malware we will continue where we left off last time and take a deeper dive into the how and the what in regards to its functionality.

Malware Analysis example. Classic case: Stuxnet

Stuxnet, as it came to be known, was unlike any other virus or worm that came before. In today's article we will reverse engineer this malware in order to better understand its code.

Static malware analysis of PDF files

We will do static analysis on PDF documents, including analysis of embedded strings.

Intro to static malware analysis

Static code analysis is the technique of studying the source code of a program without running it. This can be valuable for malware reverse engineering, as it can assist discover dangerous code.

What is DLL Hijacking? And How Does it Work?

DLL hijacking is a method in which a trusted and legit program is tricked into loading a malicious DLL.