Hardware Trojans Under a MicroscopeTable of ContentsOct 27, 2022A response icon2Oct 27, 2022A response icon2
Deobfuscating PowerShell Malware DroppersI recently saw a video of Ahmed S Kasmani dissecting a ComRAT PowerShell script to obtain the main malware that it drops onto the victim’s…Sep 26, 2021Sep 26, 2021
Pulling Bits From ROM Silicon Die Images: Unknown ArchitectureMy journey into Integrated Reverse Engineering didn’t begin too long ago but once I invested the time and understanding, I became…Mar 21, 2021A response icon3Mar 21, 2021A response icon3
Genetic Analysis of CryptoWall RansomwareA strain of a Crowti ransomware emerged, the variant known as CryptoWall, was spotted by researchers in early 2013. Ransomware by nature…Nov 23, 2020A response icon1Nov 23, 2020A response icon1
Using Z3 Theorem on AVR FirmwareAs many of you may or may not be aware of, I have a serious obsession with embedded systems security. It wasn’t until about two years ago…May 26, 2020A response icon1May 26, 2020A response icon1
Extracting Embedded Payloads From MalwareOne of my all time favorite subfields of reverse engineering is the dissection of viruses. In this article I will be exploring malware…Mar 3, 2020A response icon1Mar 3, 2020A response icon1
Reverse Engineering Encrypted Code SegmentsWhile working on a reverse engineering project, I came across a binary that appeared to be malformed since it couldn’t disassembled, but…Jan 3, 2020A response icon2Jan 3, 2020A response icon2