Recently in my internship, I was posed with a significant problem. One of the PCs at the company I work for was hit with a new kind of...
Introduction to Malware Analysis – Free Recorded Webcast
5 Steps to Building a Malware Analysis Toolkit Using Free Tools
Evaluation of Automated Malware Analysis Tools
Evaluation of Automated Malware Analysis System I (Anubis)
Self-Overwriting COM Loading for Remote Loading DLL
Stealthy Library Loading II (Using Self-Modifying APC)
Infecting Driver Files (Part II: Simple Infection)
Infecting Driver Files (Part I: Randomly Select a System Module)
Return Oriented Programming (Return to LIBC) Attack
Learning Goals: Understand how debugger saves debugger information Know how to use binary editor to examine file contents Trouble shooting...