Remove state-of-security reverse-engineering-a-security-researchers-toolkit
article thumbnail

Reverse Engineering: A Security Researcher’s Toolkit

Security Boulevard

Craig Young, Principal Security Researcher at Tripwire, unpacks the modern security researcher’s toolkit to reverse engineer complex designs. Today, I am joined by one of our security researchers, Craig Young. […]… Read More.

article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. As someone who’s helped thousands of security professionals learn how to analyze malware at SANS Institute , I have a few tips for how you can get started.

Malware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kali Linux Penetration Testing Tutorial: Step-By-Step Process

eSecurity Planet

Kali Linux turns 10 this year, and to celebrate, the Linux penetration testing distribution has added defensive security tools to its arsenal of open-source security tools. For now, Kali is primarily known for its roughly 600 open source pentesting tools, allowing pentesters to easily install a full range of offensive security tools.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Since then Hash started a reverse engineering wiki site called Recessim and created dozens of YouTube videos in a channel of that same name to chronicle his adventures. For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. Environmental effects caused by pollution.

article thumbnail

APT trends report Q1 2022

SecureList

For five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. They are designed to highlight the significant events and findings that we feel people should be aware of. The most remarkable findings.

Malware 131
article thumbnail

GhostEmperor: From ProxyLogon to kernel mode

SecureList

The former is used to hide the user mode malware’s artefacts from investigators and security solutions, while demonstrating an interesting undocumented loading scheme involving the kernel mode component of an open-source project named Cheat Engine to bypass the Windows Driver Signature Enforcement mechanism.

Malware 127
article thumbnail

The Hacker Mind Podcast: Hacking Biology

ForAllSecure

There are a lot of parallels between computer security and biology. Welcome to the hacker mind and original podcast from Brawl secure, it's about challenging our expectations about the people who hack for a living. If you think you already understand hacking systems, then I’ve got a story for you. Then I've got a story for you.

Hacking 52