Search
Reverse Engineering Malware
Articles and tutorials on the art of reverse-engineering malware, a high-demand, top-paying skill in information security. From understanding and defeating malware to enhancing and evading detection, this expertise serves both White Hat defenders and Black Hat adversaries alike.


5 min read
Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
628 views

3 min read
Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
382 views

4 min read
Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Welcome back my cyberwarriors! One of the key tasks for those defending a country's, institution's, or corporation's assets is to...
2,154 views


3 min read
Building a Honeypot to Capture Zero-day Malware, Part 2
The Golden Fleece of hackers is to develop a zero-day exploit, an exploit that has not been seen by antivirus (AV) software or and...
2,256 views

3 min read
Reverse Engineering Malware: Getting Started with Ghidra, Part 1
Welcome back, my aspiring cyber warriors! There are a number of excellent tools available to use in the field of reverse engineering (see...
19,081 views


5 min read
SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid
Welcome back to this series on SCADA Hacking and Security! SCADA/ICS security is critical for SO many reasons. Among the most important...
11,843 views

3 min read
Reverse Engineering Malware: Reversing and Disassembly Tools
Welcome back, my aspiring malware analysts! In previous tutorials here, I have demonstrated the power of such reversing and disassembly...
4,538 views

5 min read
Reverse Engineering Malware, Part 5: OllyDbg Basics
In this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and...
29,913 views

4 min read
Reverse Engineering Malware, Ghidra Part 3: Analyzing the WannaCry Ransomware
Welcome back, my aspiring cyber warriors! Reverse engineering is one of the most highly sought and most valuable cybersecurity/infosec...
7,618 views

5 min read
Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
31,174 views


3 min read
SCADA Hacking: The Triton Malware Threat to SCADA/ICS Infrastructure
Welcome back, my aspiring SCADA cyber warriors! SCADA/ICS infrastructure is under continuous threat. These systems are crucial to any...
2,796 views

3 min read
Web App Hacking: BurpSuite, Part 2: Bypass Weak Input Validation to Upload Malware to a Website
Welcome back, my aspiring cyber warriors! In general, we can say that the solution to many injection attacks in web applications is...
4,333 views

2 min read
Reverse Engineering Malware: Getting Started with Ghidra, Part 2
Welcome back, my aspiring cyber warriors! Reverse engineering malware is among the highest-level skill sets in our discipline and it's...
3,737 views

5 min read
Reverse Engineering Malware, Part 2: Assembler Language Basics
Most of the work we will be doing in reverse engineering will be with assembler language. This simple and sometimes tedious language can...
11,601 views

4 min read
Reverse Engineering Malware, Part 6: System Level or Behavioral Analysis
Welcome back, my aspiring malware analysts! In my introductory tutorials on reverse engineering malware (Part 1-5) we introduced many new...
2,739 views

4 min read
Reverse Engineering Malware: Why YOU Should Study Reverse Engineering Malware
I am about to embark upon probably the most technically demanding tutorial series, Reverse Engineering Malware. Before I do so, I thought...
10,451 views

8 min read
Reverse Engineering Malware, Part 4: Windows Internals
Welcome back to my Reverse Engineering Malware series. In general, reverse engineering of malware is done on Windows systems. That's...
11,691 views

4 min read
Reverse Engineering Malware, Part 3: IDA Pro Introduction
Welcome back to my Reverse Engineering Malware course! This course is designed for those of you who want to ascend to the pinnacle of...
18,554 views


2 min read
Vault7 Reveals that Even the CIA Reverse Engineers Malware to Re-Use Code
The recent CIA data dump from Wikileaks named Vault7, reveals many things about the CIA's cyber intelligence efforts. For my part, the...
3,261 views