CATEGORIES

Welcome to Our How-To Guides

August 23, 2018

Have you ever wondered what lies behind our security publications? What tricks are used to understand the inner workings of malware faster and more efficiently? If you’ve ever wanted to know the answers to these questions, pull up in a chair and get comfortable; you’re in the right place.

Our series of ‘How-To Guides’ are designed to lower the entrance threshold for malware analysis. We share our knowledge and show that reverse engineering can be fun when the right tools are used at the right time. We also hope that these series will give motivation and drive for inquisitive minds to contribute further to this exciting arena.

Throughout the series we take real cases encountered while analyzing malware samples, unveil yet uncovered parts of previous researches and show applied tricks that could be used and evolve in the future.

Enjoy the journey!

For our first series, click here to learn how to use Labeless, an invaluable tool in the researcher’s tool kit. Happy learning!

POPULAR POSTS

BLOGS AND PUBLICATIONS

  • How To Guides

Welcome to Our How-To Guides

  • Check Point Research Publications
  • How To Guides
November 14, 2019

The Road to Qualcomm TrustZone Apps Fuzzing

  • Check Point Research Publications
  • How To Guides
  • Threat Research
June 7, 2018

Scriptable Remote Debugging with Windbg and IDA Pro