Entries filed under 'Michael Bailey '
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
January 4, 2018 11:30 AM By Michael Bailey
In this blog, learn about a simple debugging tactic for creating “save points” during iterative remote debugging of complex multi-stage samples that execute code in heap memory at non-deterministic addresses.Read more...
October 23, 2017 11:15 AM By Matthew Haigh, Michael Bailey , Peter Kacherginsky
FLARE’s FakeNet-NG tool is a powerful network-simulation tool available for Windows and Linux, and the new content-based protocol detection and SSL detection features ensure that FakeNet-NG remains the most useful tool for malware analysts.Read more...
July 5, 2017 11:00 AM By Michael Bailey
FLARE has brought FakeNet-NG to Linux, allowing analysts to perform basic dynamic analysis either on a single Linux host or using a separate, dedicated machine in the same way as INetSim.Read more...
FLARE Script Series: Querying Dynamic State using the FireEye Labs Query-Oriented Debugger (flare-qdb)January 4, 2017 9:02 AM By Michael Bailey | Advanced Malware
The latest in the script series from the FireEye Labs Advanced Reverse Engineering (FLARE) steps through a command-line utility and Python module for querying and altering dynamic binary state.