Notes about Reverse Engineering of Malware Banker Infostealer.Banker.C with OllyDbg 2
Fast Notes About Infostealer.Banker.C
Regards,
Giuseppe ‘Evilcry’ Bonfa’
Notes about Reverse Engineering of Malware Banker Infostealer.Banker.C with OllyDbg 2
Fast Notes About Infostealer.Banker.C
Regards,
Giuseppe ‘Evilcry’ Bonfa’
Hosted by my second blog
http://evilcodecave.blogspot.com/2009/06/pills-of-reversing-f-chunks-how-to-fast.html
Hi,
The ability to detect Suspicious or Malicious Binaries on a network stream is one of the fundamental Risk Mitigation technique, only by knowing what flows in a traffic stream can allow the best efficient countermeasure.
Here nPEiD (Network PEiD) which allows you to detect binary packers into a network stream.
Hi,
This is a replacement for the IDA PDB plugin which significantly improves the analysis of Microsoft binaries with public debugging symbols. The algorithm used by the PDB plugin is described in the Reverse Engineering Microsoft Binaries presentation at Recon 2006.
Download plugin here: detpdb-1.0.zip
Regards,
Giuseppe ‘Evilcry’ Bonfa’