• Home
  • Insights & Strategy
  • Projects
    • Malware Analysis
    • IR & Digital Forensics
    • Data Pipelines
    • IAM - EPM
  • Code Samples
  • About Me & Contact
  • More
    • Home
    • Insights & Strategy
    • Projects
      • Malware Analysis
      • IR & Digital Forensics
      • Data Pipelines
      • IAM - EPM
    • Code Samples
    • About Me & Contact
  • Home
  • Insights & Strategy
  • Projects
    • Malware Analysis
    • IR & Digital Forensics
    • Data Pipelines
    • IAM - EPM
  • Code Samples
  • About Me & Contact

  

When it comes to understanding attacker tradecraft few, if any, methods of research can yield better results than the reverse engineering of malware.

How they get the malicious content to the target, execute the payload, and achieve their objectives is hardcoded into the very scripts and programs they use.

In this article, I reverse engineer a modern malware installer, detail how malware has evolved, and discuss ways to defend against it. 

Copyright © 2025 Eric Passeno | Cybersecurity - All Rights Reserved.


Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept