Results 1 to 3 of 3

Thread: Basics for Malware Reversing

  1. #1

    Basics for Malware Reversing

    Hi folks,

    I want to improve my knowledge on Malware Reversing and have started reading for the same. I wanted suggestions about few key topics for reversing malwares:

    1. Understanding and identifying Code Injection through debuggers - I have gone through basic ways in which a malware injects code but have not been able to see it step by step in Olly
    2. Breaking in Olly when the malware communicates with the C&C through network
    3. Identifying decrypting routines used by malware and viewing the decrypted content in the debugger

    I have started reading basics from a few sources like "Reverse Engineering book by Eldad Eilam" and "Lenas Tutorials". It would be great to get any pointers on how I can perform these topics in debuggers.

    I promise that I have read the FAQ and tried to use the Search to answer my question.

  2. #2
    Teach, Not Flame Kayaker's Avatar
    Join Date
    Oct 2000
    Blog Entries

    Here are couple of other resources you might want to refer to, if you haven't already seen them, which may shed light on your specific questions.

    Hopefully others will have additional suggestions.

  3. #3
    very useful links, thanks a lot
    I promise that I have read the FAQ and tried to use the Search to answer my question.

Similar Threads

  1. LINK: Windows DLL Injection Basics
    By Kayaker in forum Advanced Reversing and Programming
    Replies: 4
    Last Post: January 17th, 2013, 04:51
  2. Had to say (Driver Debugging Basics)
    By /db/ in forum The Newbie Forum
    Replies: 8
    Last Post: December 10th, 2011, 13:34
  3. VMProtect, Part 0: Basics
    By OpenRCE_RolfRolles in forum Blogs Forum
    Replies: 15
    Last Post: September 1st, 2008, 06:00
  4. InTether Protection System Reversing...Reversing Kernel Code
    By tHE mUTABLE in forum Advanced Reversing and Programming
    Replies: 1
    Last Post: December 20th, 2007, 10:48
  5. Basics of Cryptography
    By Aimless in forum RCE Cryptographics
    Replies: 14
    Last Post: November 1st, 2001, 10:00


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts