Learn about RIFT – A tool to assist in reverse engineering rust binaries!

Latest Blog Articles

  • The DLL Search Order And Hijacking It

    The DLL Search Order And Hijacking It

    If you ever used Process Monitor to track activity of a process, you might have encountered the following pattern: The image above is a snippet from events captured by Process Monitor during the execution of x32dbg.exe on Windows 7. DNSAPI.DLL and IPHLPPAPI.DLL are persisted in the System directory, so you might question yourself: Why would…

  • PEB: Where Magic Is Stored

    PEB: Where Magic Is Stored

    As a reverse engineer, every now and then you encounter a situation where you dive deeper into the internal structures of an operating system as usual. Be it out of simple curiosity, or because you need to understand how a binary uses specific parts of the operating system in certain ways . One of the…

  • Catching Debuggers with Section Hashing

    Catching Debuggers with Section Hashing

    As a Reverse Engineer, you will always have to deal with various anti analysis measures. The amount of possibilities to hamper our work is endless. Not only you will have to deal with code obfuscation to hinder your static analysis, but also tricks to prevent you from debugging the software you want to dig deeper…

Scroll to Top