- The DLL Search Order And Hijacking Itby Andreas KlopschIf you ever used Process Monitor to track activity of a process, you might have encountered the following pattern: The image above is a snippet from events captured by Process Monitor during the execution of x32dbg.exe on Windows 7. DNSAPI.DLL and IPHLPPAPI.DLL are persisted in the System directory, so you might question yourself: Why would… Read more: The DLL Search Order And Hijacking It
- PEB: Where Magic Is Storedby Andreas KlopschAs a reverse engineer, every now and then you encounter a situation where you dive deeper into the internal structures of an operating system as usual. Be it out of simple curiosity, or because you need to understand how a binary uses specific parts of the operating system in certain ways . One of the… Read more: PEB: Where Magic Is Stored
- Catching Debuggers with Section Hashingby Andreas KlopschAs a Reverse Engineer, you will always have to deal with various anti analysis measures. The amount of possibilities to hamper our work is endless. Not only you will have to deal with code obfuscation to hinder your static analysis, but also tricks to prevent you from debugging the software you want to dig deeper… Read more: Catching Debuggers with Section Hashing
- Taming Virtual Machine Based Code Protection – 2by Andreas KlopschIn the last episode … As you’ve probably guessed it, this is the second part of my journey to reverse engineer a virtual machine protected binary. If you haven’t read the first part[1], I encourage you to do so, because I will not repeat everything again here. While the first part dealt with explaining the… Read more: Taming Virtual Machine Based Code Protection – 2
- DGAs – Generating domains dynamicallyby Andreas KlopschA domain generation algorithm is a routine/program that generates a domain dynamically. Think of the following example: An actor registers the domain evil.com. The corresponding backdoor has this domain hardcoded into its code. Once the attacker infects a target with this malware, it will start contacting its C2 server. As soon as a security company… Read more: DGAs – Generating domains dynamically