Static malware analysis: Office documentsHello and welcome back to a new practical case: analyze office documents. In our case, we are going to start looking at how to analyze Microsoft Office documents.
Malware Analysis example. Classic case: Stuxnet. Part 2In this part 2 of our reverse engineering article of the stuxnet malware we will continue where we left off last time and take a deeper dive into the how and the what in regards to its functionality.
Malware Analysis example. Classic case: StuxnetStuxnet, as it came to be known, was unlike any other virus or worm that came before. In today's article we will reverse engineer this malware in order to better understand its code.
Static malware analysis of PDF filesWe will do static analysis on PDF documents, including analysis of embedded strings.
Intro to static malware analysisStatic code analysis is the technique of studying the source code of a program without running it. This can be valuable for malware reverse engineering, as it can assist discover dangerous code.
What is DLL Hijacking? And How Does it Work?DLL hijacking is a method in which a trusted and legit program is tricked into loading a malicious DLL.
How to Get Into CybersecurityLooking to learn how to break into cybersecurity? Search no further! This article covers everything you need to know about getting into cybersecurity.
Top 10 Best Security Tools for PentestingThis article covers the top 10 best security tools for pentesting. Learn the key features of each tool and where to hire the best pentesting experts.
5 Major Types of Phishing AttacksThis article covers the five major types of phishing attacks. Read to learn how phishing attacks work and how to prevent various types of phishing.
What is Phishing? How it Works and How to Prevent AttacksThis article covers everything you need to know about phishing. Read to learn what it is, how it works, its features, and how to prevent phishing attacks.
What is Code Review and Why is it Important?Code review is a quality assurance process aimed at ensuring high-quality code via well-planned assessments to spot and get rid of bugs. Read to know why it is important.
Red Teaming: What it is, Why it Matters and Everything You Need to KnowRed Teaming is a multi-layered simulated attack used to test the security framework of an organization. Read to know how it works and why your company needs it.