A comprehensive reverse engineering tutorial covering x86, x64 and ARM architectures.
This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the basic forms of malware and how they work in simple terms.
-> Click HERE to read the article on LinkedIn.
This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the very basics of the binary number system.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the very basics of the hexidecimal number system.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the basics of transistors and memory.
-> Click HERE to read the article on LinkedIn.
Lesson 8: Assembly Language - Basic Malware Reverse Engineering (Part 8 - Bytes, Words, Double Words, etc...)
This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions.
-> Click HERE to read the article on LinkedIn.