- May 7, 2013
- 10,400
Prerequisites:
Please note the information within this post is unlikely to be suitable for beginners who have just started to learn about the internals of Windows and operating systems.
This a repository of .PDFs I have collected, which can be downloaded from SkyDrive account:
https://skydrive.live.com/?mkt=en-GB#cid=7101A9E8FE03DB78&id=7101A9E8FE03DB78!105
I have a few others which are loosely related to Security, but they lean more on Windows Internals. I currently have 325MB (397 files, 39 folders) of .PDFs and Word/PowerPoint files :grin1:
There's some papers I haven't read yet and had simply forgotten about them, looks like I have reading to do too!
Blogs/Links:
Most of these blogs can be found on my own blog in the Blogroll section, but I'll post them here for accessibility:
KernelMode.Info is a forum which has some good material and questions related to Reverse Engineering. I would also suggest looking at Corelan Team's website.
Tools:
I have personally been practicing with OllyDbg (User-Mode only) and IDA (Freeware version). There may be some other tools too, but since this isn't my field of expertise and I'm still learning how to use some of the tools, I may have missed some key tools for Malware Analysis. You can use WinDbg too, and I believe there may be some WinDbg plug-ins for IDA Pro.
- OllyDbg
- IDA
- Strong Understanding of Windows Internals
- Strong Understanding of Assembly
Please note the information within this post is unlikely to be suitable for beginners who have just started to learn about the internals of Windows and operating systems.
This a repository of .PDFs I have collected, which can be downloaded from SkyDrive account:
https://skydrive.live.com/?mkt=en-GB#cid=7101A9E8FE03DB78&id=7101A9E8FE03DB78!105
I have a few others which are loosely related to Security, but they lean more on Windows Internals. I currently have 325MB (397 files, 39 folders) of .PDFs and Word/PowerPoint files :grin1:
There's some papers I haven't read yet and had simply forgotten about them, looks like I have reading to do too!
Blogs/Links:
Most of these blogs can be found on my own blog in the Blogroll section, but I'll post them here for accessibility:
- XyliBox
- xorl %eax, %eax
- VRT
- Security/malware blog
- Security Garden
- Security
- r0cket's malware blog
- Malware Must Die!
- Malware don't need Coffee
- Malware Digger
- HEXALE (security & reverse engineering)
- Malware Analysis and Removal
- Hex Blog | State-of-the-art code analysis
- FlUxIuS' Blog | Your life is a fight, curiosity is your weapon
- Dr. Fu's Security Blog
- MNIN Security Blog
KernelMode.Info is a forum which has some good material and questions related to Reverse Engineering. I would also suggest looking at Corelan Team's website.
Tools:
I have personally been practicing with OllyDbg (User-Mode only) and IDA (Freeware version). There may be some other tools too, but since this isn't my field of expertise and I'm still learning how to use some of the tools, I may have missed some key tools for Malware Analysis. You can use WinDbg too, and I believe there may be some WinDbg plug-ins for IDA Pro.
- OllyDbg
- IDA