A forum for reverse engineering, OS internals and malware analysis 

Discussion on reverse-engineering and debugging.
 #138  by ConanTheLibrarian
 Mon Mar 15, 2010 1:34 am
I am a malware remover working for a commercial company. I see new stuff all the time and figure out ways of removing malware online without going into any offline environment. However, I do not know how to debug or reverse engineer. I have no programing experience. Is there somewhere I can go or something I can read that will help educate me?
 #143  by a_d_13
 Mon Mar 15, 2010 1:51 am
http://forum.tuts4you.com/index.php is a good place for this - they have lots of tutorials, some with video, on how to learn to Reverse-Engineer. I would recommend you download some packers or malware, install them in a Virtual Machine, and then go ahead and try out debugging or unpacking. You should always do reverse-engineering in a Virtual Machine (VMWare, Microsoft Virtual PC, etc.)

Thanks,
--AD
 #150  by __Genius__
 Mon Mar 15, 2010 8:38 am
Good point AD,
Furthermore you can pick up some books on reverse engineering like "Reversing : secrets of reverse engineering" and "IDA Pro book" from no starch press.
These can help you understand some concepts behind Operating System and better understanding of underlying architecture you're working on .
best regards,
-Genius
 #164  by GamingMasteR
 Mon Mar 15, 2010 11:04 am
Hi,

For malware analysis I suggest you to intense your reading/practising on threa fields :
- Unpacking & rebuilding executables memory dumps
- Obfuscated & virtualized binary code
- Anti-Xxx tricks (anti-debug/anti-trace/anti-blah blah)

You may also visit woodmann & ARTeam forums :
woodmann.com
accessroot.com

Good luck,
GM
 #10131  by xsk
 Sun Dec 04, 2011 6:28 pm
Step 1: Learn C/C++/Delphi etc. You can't reverse engineer if you can't forward engineer.
Step 2: Learn x86 assembly - http://opensecuritytraining.info/IntroX86.html (includes videos)
Step 3: Learn x86 architecture - http://opensecuritytraining.info/IntermediateX86.html (includes videos)
Step 4: Learn PE binary format - http://opensecuritytraining.info/LifeOfBinaries.html (includes videos)
Step 5: Learn about IDA & general RE thought process - http://opensecuritytraining.info/Introd ... ering.html (video pending)
Step 6: Learn about some stealth malware techniques - http://opensecuritytraining.info/Rootkits.html (includes videos)
Step 7: Learn more by encouraging other people to submit their own class material - http://opensecuritytraining.info/Why.html

Xeno