Blogs
-
GREM Preparation
The main aim of this blog is to give an overview of the process that I followed to pass the GIAC Reverse Engineering Malware (GREM) exam. Hopefully this can help someone who is going through the same journey or planning to start. read more
Posted in reversing, Memory Forensics, IR, Malware analysis, Information security
-
FLARE On Challenge 2018
Flare-On is a CTF challenge organized by Flare team of FireEye labs. There are a total of 12 challenges totally based on reverse engineering. Without further ado, lets get started on the write ups of challenges which I was able to solve. read more
-
Thread Local Storage
In the previous blog, we got to know that every PE file has an address of entry point from where program starts executing. But, is it really true! In this blog, we are going to learn how we can run code even before entry point using a capability typically known as Thread Local Storage (TLS) and what it can be used for. read more
Posted in PE File, reversing, security, windows internals, TLS
-
Reversing Portable Executable
The main aim of this blog is to correlate the Operating System Internals and the approach of Reverse Engineering a malware at code level. Here I will be showing what are the basic things that happen when a portable executable is started. You can use any executable to deep dive into OS internals. read more
Posted in PE File, reversing, security, windows internals