Loading...

Windows Inline Function Hooking

Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function calls that a malicious program is making. It can also be used by a malicious [...]

By |2015-03-18T10:27:47+00:00March 18, 2015|

Vulnerability Discovery Via 'Fuzzing'

Why would you fuzz? People fuzz for many reasons, depending on the industry they are in, from reliable assurance through to testing and validation. In security research, our primary goal is to discover [...]

By |2015-03-11T10:14:28+00:00March 11, 2015|

DLL Injection: Part Two

In a previous blog post I gave a high level overview of DLL injection, what it is used for and how it might be achieved. More than one method exists to get our [...]

By |2015-03-04T11:02:14+00:00March 4, 2015|

DLL Injection: Part One

A High Level Overview DLL injection is a technique that can be used by legitimate software to add functionality, aid with debugging, or reverse engineer software running on a Windows PC.  It is [...]

By |2015-02-25T10:18:17+00:00February 25, 2015|

A Beginners’ Guide to Obfuscation

Obfuscation is a technique used to change software code in order to make it harder for a human to understand. There are several reasons one might obfuscate code: To make it harder for [...]

By |2015-02-11T11:50:53+00:00February 11, 2015|
Load More Posts
Go to Top