Entries filed under 'Ida Pro'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
November 16, 2015 8:00 AM By Jay Smith | Threat Research, Advanced Malware
April 17, 2015 8:00 AM By Jay Smith, Peter Kacherginsky | Advanced Malware, Threat Research
The FireEye Labs Advanced Reverse Engineering (FLARE) Team examines reverse engineering tools including ApplyCalleeType and StructTyper.Read more...
June 19, 2013 5:00 PM By Jay Smith
IDA Pro comes with an incredibly useful array of type information gathered from various compilers. Whenever a user names a location, IDA searches its currently loaded type libraries to see if that name is a known function. If the function is found, IDA applies the function declaration to that location. For example, Figure 1 shows an array of DWORDS. During reverse engineering, I determined that these are function pointers to MS SDK API functions.Read more...
March 12, 2013 6:26 PM By Helena Brito
As cybersecurity becomes more well-known outside our industry, the hope is to draw top talent to some of the most interesting careers within the field, such as reverse engineering. Unfortunately, there is still a large imbalance between men and women in cybersecurity; especially when it comes to highly technical positions.Read more...