top of page
Search


Reverse Engineering Essentials — 3
Hey there! We’ve been on the journey to understand reverse engineering in our last two blogs. Today, let’s talk about the stuff that keeps security folks up at night. We’ll see types of major malware, different reversing approaches, PE header analysis (examining the structure of Windows executables), and the benefits and limitations of both static analysis (which examines code without execution) and dynamic analysis (which observes runtime behavior). Types of Malwares: Viruse
Aastha Thakker
7 min read
bottom of page