We’re proud to release a new plug-in for IDA Pro users – SimplifyGraph – to help automate creation of groups of nodes in the IDA’s disassembly graph view.Read more...
Entries filed under 'Ida Pro'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
November 16, 2015 8:00 AM By Jay Smith | Advanced Malware
April 17, 2015 8:00 AM By Jay Smith, Peter Kacherginsky | Advanced Malware
The FireEye Labs Advanced Reverse Engineering (FLARE) Team examines reverse engineering tools including ApplyCalleeType and StructTyper.Read more...
August 1, 2014 3:18 PM | Advanced Malware
June 19, 2013 5:00 PM By Jay Smith
IDA Pro comes with an incredibly useful array of type information gathered from various compilers. Whenever a user names a location, IDA searches its currently loaded type libraries to see if that name is a known function. If the function is found, IDA applies the function declaration to that location. For example, Figure 1 shows an array of DWORDS. During reverse engineering, I determined that these are function pointers to MS SDK API functions.Read more...