top of page
Search
Reverse Engineering


Reverse Engineering Essentials — 4
Many cyber enthu-beginners ask that how software companies protect their secret sauce? Or how hackers manage to slip past sophisticated security systems? The answer often lies in a technique called code obfuscation. Code obfuscation is simply the process of transforming clear, readable code into something deliberately confusing and hard to guess, while ensuring it still functions exactly as wanted. Developers POV: For legitimate software developers, obfuscation becomes a digi
Aastha Thakker
6 min read


Reverse Engineering Essentials — 3
Hey there! We’ve been on the journey to understand reverse engineering in our last two blogs. Today, let’s talk about the stuff that keeps security folks up at night. We’ll see types of major malware, different reversing approaches, PE header analysis (examining the structure of Windows executables), and the benefits and limitations of both static analysis (which examines code without execution) and dynamic analysis (which observes runtime behavior). Types of Malwares: Viruse
Aastha Thakker
7 min read


Reverse Engineering Essentials — 2
After covering the basics of ISA architectures, CPU components, and clock speed, it’s time to understand the workings of a system. This part focuses on memory hierarchy, stack, heap, registers, and flags. This will help to understand how programs execute, manage data, and interact with hardware. Memory Hierarchy Memory Hierarchy is a computer design strategy that organizes memory types from fastest and smallest (CPU registers) to slowest and largest (hard drives), solving two
Aastha Thakker
5 min read


Reverse Engineering Essentials — 1
Hey everyone! In our last blog, we talked about what “engineering” really means, and how “reverse engineering” fits into that picture. Now, to truly get in reverse engineering, we need to understand the basics of computers first. So, where do we start? Well, we’re going to cover some basics: the different “capacity” computers have (architectures like x86 and x64), the key parts of the brain of the computer (the CPU) and how fast it ticks (clock speed). If you’ve played around
Aastha Thakker
5 min read


Forward & Reverse Engineering
How frequently do you hear the term “reverse engineering” in the cyber world? Often, right! To understand reverse engineering properly, we must first grasp what engineering itself is. Let’s explore both forward and reverse engineering concepts — after all, if you want to reverse a car, you need to first learn how to drive forward! Engineering is the application of scientific and mathematical principles to design, build, and optimize structures, systems, and technologies that
Aastha Thakker
3 min read
bottom of page