Reverse engineering Malware

Security Training www.SecurityXploded.com

Reverse-Engineering Malware: Malware Analysis Tools and Techniques

Reverse-Engineering Malware Cheat Sheet by Lenny Zeltser

Analyzing Malicious Documents Cheat Sheet by Lenny Zeltser

REMnux Usage Tips for Malware Analysis on Linux

REMnux: A Linux Distribution for Reverse-Engineering Malware

http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1124.pdf

http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2013/n3690.pdf

http://en.wikipedia.org/wiki/Object-oriented_programming

http://en.wikipedia.org/wiki/Polymorphism_%28computer_science%29

http://en.wikipedia.org/wiki/Virtual_table

http://en.wikipedia.org/wiki/RTTI

http://en.wikipedia.org/wiki/Program_database

http://en.wikipedia.org/wiki/Application_binary_interface

http://www.openrce.org/articles/full_view/21

http://www.blackhat.com/presentations/bh-dc-07/Sabanal_Yason/Paper/bh-dc-07-Sabanal_Yason-WP.pdf

http://msdn.microsoft.com/en-us/library/ff770587.aspx

http://qt.digia.com/

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont indiqués avec *