Highest Rated Comments


Admiral_Blender3 karma

What process do you use for reverse engineering? I'm looking to set up a sandbox environment and study, do you have any suggestions on good resources? Favorite book on the subject (or website)? I am done with a digital forensics certificate and working towards the degree, and would way rather get into this than having to catch perverts and testify. You actually have my dream job at the moment, any advice to get to where you are would be appreciated.

Admiral_Blender2 karma

thank you so much!

Admiral_Blender1 karma

I can probably look this up, but is Malwarebytes just based off fingerprinting/hashing or does it work heuristics/behavior? Any plans to go to behavior if not? Would that just bloat the software?

Admiral_Blender1 karma

Ever ran across malware that can affect multiple operating systems? What do you do about a program that has random permutations?

Anything that is just not solvable at the moment?