all InfoSec news
.NET Hooking – Harmonizing Managed Territory
Check Point Research research.checkpoint.com
Research by: Jiri Vinopal Key Points Introduction For a malware researcher, analyst, or reverse engineer, the ability to alter the functionality of certain parts of code is a crucial step, often necessary to reach a meaningful result during the analysis process. This kind of code instrumentation is usually reached by debugging, DBI (Dynamic Binary Instrumentation), […]
The post .NET Hooking – Harmonizing Managed Territory appeared first on Check Point Research.
analysis analyst binary check point research publications code debugging dynamic engineer hooking instrumentation introduction key key points kind malware managed meaningful parts points process research researcher result reverse reverse engineer