• GREM Preparation

    The main aim of this blog is to give an overview of the process that I followed to pass the GIAC Reverse Engineering Malware (GREM) exam. Hopefully this can help someone who is going through the same journey or planning to start. read more

    Posted in , , , ,

  • FLARE On Challenge 2018

    Flare-On is a CTF challenge organized by Flare team of FireEye labs. There are a total of 12 challenges totally based on reverse engineering. Without further ado, lets get started on the write ups of challenges which I was able to solve. read more

    Posted in , ,

  • Thread Local Storage

    In the previous blog, we got to know that every PE file has an address of entry point from where program starts executing. But, is it really true! In this blog, we are going to learn how we can run code even before entry point using a capability typically known as Thread Local Storage (TLS) and what it can be used for. read more

    Posted in , , , ,

  • Reversing Portable Executable

    The main aim of this blog is to correlate the Operating System Internals and the approach of Reverse Engineering a malware at code level. Here I will be showing what are the basic things that happen when a portable executable is started. You can use any executable to deep dive into OS internals. read more

    Posted in , , ,