Skip to main content

Posts

Showing posts from March, 2015

Hacking - Best OF Reverse Engineering - Part20

Glimpse of Static Malware Analysis The internet has become an essential part of our day-to-day life. We are using it to communicate, exchange information, perform bank transactions, etc. Researchers are working around the clock to expand this service and optimize it. Hackers, on the other hand, are leveraging this crucial service to perform cybercrime activities, such as stealing credit cards. Over the past few years, talented and geek computer users were exploiting and identifying applications and operating systems’ vulnerabilities for fun. However, the game has changed and shifted from a fun activity towards a profit-oriented business. Some research [3] indicates that the average global economy loss due to cybercrime and espionage is $500 billion annually. Hackers use malicious software (malware), e.g., virus, worm, or rootkit, to perform their activities. Therefore, understanding and analyzing the malware is very important to protect the end users. Moreover, it will help t

Hacking - Best OF Reverse Engineering - Part19

Setting Up Your Own Malware Analysis Lab With new malware attacks making news everyday and compromising company’s network and critical infrastructures around the world, malware analysis is critical for anyone who responds to such incidents. In this article you will learn to setup a safe environment to analyze malicious software and understand its behaviour. Malware is a piece of software which causes harm to a computer system without the owner’s consent. Viruses, Trojans, worms, backdoors, rootkits, scareware and spyware can all be considered as malwares. Malware Analysis Malware analysis is the process of understanding the behaviour and characteristics of malware, how to detect and eliminate it. Why Malware Analysis? There are many reasons why we would want to analyze a malware, below to name just a few: • Determine the nature and purpose of the malware i.e whether the malware is an information stealing   malware, http bot, spam bot, rootkit, keylogger, RAT etc. •