There is a common annoyance that seems to plague every reverse engineer and incident responder at some point in their career: wasting time or energy looking at junk code.Read more...
Entries filed under 'Reverse Engineering'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
March 8, 2017 12:15 PM By James T. Bennett | Advanced Malware
The FLARE team introduces two small tools to aid in reverse engineering Cocoa applications for macOS, explaining how the Objective-C runtime complicates code analysis in tools such as IDA Pro, and how to find useful entry points into a Cocoa application’s code to begin analysis.
September 13, 2016 10:20 AM By Nick Harbour | Vulnerabilities
FireEye will host the third annual FireEye Labs Advanced Reverse Engineering (FLARE) team challenge beginning September 23rd. This six-week challenge is open to all active and aspiring reverse engineers, malware analysts and security professionals.
August 22, 2016 8:00 AM By Gordon Johnson | Advanced Malware
Connected devices are on the rise and here to stay. While they can make our lives much easier they also make easier targets for threat actors. Here we take a look at how someone could reverse engineer an embedded device, and at the process for attempting to find vulnerabilities.Read more...
August 12, 2016 10:00 AM By Grady Summers | Vulnerabilities
What does it take to analyze malware? Who figures out where it comes from and how to stop it? This podcast examines those questions and more.Read more...