We’re proud to release a new plug-in for IDA Pro users – SimplifyGraph – to help automate creation of groups of nodes in the IDA’s disassembly graph view.Read more...
Entries filed under 'Ida Pro'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
November 16, 2015 8:00 AM By Jay Smith | Advanced Malware
April 17, 2015 8:00 AM By Jay Smith, Peter Kacherginsky | Advanced Malware
The FireEye Labs Advanced Reverse Engineering (FLARE) Team examines reverse engineering tools including ApplyCalleeType and StructTyper.Read more...
August 1, 2014 3:18 PM | Advanced Malware
June 19, 2013 5:00 PM By Jay Smith
IDA Pro comes with an incredibly useful array of type information gathered from various compilers. Whenever a user names a location, IDA searches its currently loaded type libraries to see if that name is a known function. If the function is found, IDA applies the function declaration to that location. For example, Figure 1 shows an array of DWORDS. During reverse engineering, I determined that these are function pointers to MS SDK API functions.Read more...