How to Deal with Malware

With this brief tutorial, here at UIC we are going to open a new Reversing Chapter that follows the new challenge promptly emerged in the last years: Malware Reverse Engineering. This field is … read more.

How To Attack a WEP/WPA Protected Wireless Network

Updated on Jan/2013:¬†Added WPS section Any help in completing this document is welcome, thanks! In this guide we'll try to discuss the many vulnerabilities affecting the WEP and WPA protocols. … read more.

Guidelines to MFC Reversing

Software developed with MFC may import MFC80U.dll (MFC80U is the name of the last version of the dll, as I'm writing), it depends on the type of compilation: as a static library or as a shared … read more.

X64 Assembly

Links and References Introduction Essay Links And References AMD64 documentation Introduction This article is extracted from "Moving to Windows x64" by Daniel Pistelli … read more.