Welcome to Our How-To Guides
Have you ever wondered what lies behind our security publications? What tricks are used to understand the inner workings of malware faster and more efficiently? If you’ve ever wanted to know the answers to these questions, pull up in a chair and get comfortable; you’re in the right place.
Our series of ‘How-To Guides’ are designed to lower the entrance threshold for malware analysis. We share our knowledge and show that reverse engineering can be fun when the right tools are used at the right time. We also hope that these series will give motivation and drive for inquisitive minds to contribute further to this exciting arena.
Throughout the series we take real cases encountered while analyzing malware samples, unveil yet uncovered parts of previous researches and show applied tricks that could be used and evolve in the future.
For our first series, click here to learn how to use Labeless, an invaluable tool in the researcher’s tool kit. Happy learning!