top of page
Search


YARA Rules: Strings. Conditions. Caught.
If you’re in cybersecurity, you’ve almost certainly dealt with malware or at the very least, heard the news about it. But here’s a question: how do you find it when it’s already hiding on a system, hiding in like a perfectly normal file? The answer, in many SOC environments and threat intel teams, is YARA . If you’ve heard of it, great, you’re already know the game. If you haven’t? Well, you just heard it right now. Either way, get hands on. You must understand what a YARA ru
Aastha Thakker
6 min read


Reverse Engineering Essentials — 2
After covering the basics of ISA architectures, CPU components, and clock speed, it’s time to understand the workings of a system. This part focuses on memory hierarchy, stack, heap, registers, and flags. This will help to understand how programs execute, manage data, and interact with hardware. Memory Hierarchy Memory Hierarchy is a computer design strategy that organizes memory types from fastest and smallest (CPU registers) to slowest and largest (hard drives), solving two
Aastha Thakker
5 min read


Forward & Reverse Engineering
How frequently do you hear the term “reverse engineering” in the cyber world? Often, right! To understand reverse engineering properly, we must first grasp what engineering itself is. Let’s explore both forward and reverse engineering concepts — after all, if you want to reverse a car, you need to first learn how to drive forward! Engineering is the application of scientific and mathematical principles to design, build, and optimize structures, systems, and technologies that
Aastha Thakker
3 min read
bottom of page