This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing a new IDAPython...
Read moreThis blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing a new IDAPython...
Read moreBIOS Boots What? Finding Evil in Boot Code at Scale!
August 8 2018The second issue is that reverse engineering all boot records is impractical. Given the job of determining if a single system is infected with a bootkit, a...
Read moreIntroduction In December 2017, FireEye's Mandiant discussed an incident response involving the TRITON framework. The TRITON attack and many of the publicly discussed ICS intrusions involved...
Read moreIntroduction In December 2017, FireEye's Mandiant discussed an incident response involving the TRITON framework. The TRITON attack and many of the publicly discussed ICS intrusions involved...
Read moreUsers have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time....
Read moreUsers have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time....
Read moreUsers have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time....
Read moreUsers have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time....
Read moreSolving Ad-hoc Problems with Hex-Rays API
April 10 2018Introduction IDA Pro is the de facto standard when it comes to binary reverse engineering. Besides being a great disassembler and debugger, it is possible...
Read more
Recent Comments