1/21/2024 0 Comments X32Dbg Download![]() ![]() This will also provide good information if we are performing any Reverse Engineering work, especially in modified binaries or malware samples that try to “hide” information on the binary itself. We will need to identify the sections we want to read or modify if necessary when packing executables. That’s why, in my style, I think that before starting to look for unpacking mechanisms or similar resources, we first need to understand how an actual binary is formed, what its structure of itself, and how a “packer” will use this information to create a “packed” executable. ![]() ![]() The main idea is to better understand how the packing mechanism works and the techniques and ways to apply this, with a particular focus on malware development and analysis and how today’s malware executables try to hide from different detection systems. Hello all! I’m writing this post for learning purposes, as research about the topic on the title. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |