mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2026-01-03 22:34:28 +01:00
moving files around
This commit is contained in:
127
RE101/retools.md
Normal file
127
RE101/retools.md
Normal file
@@ -0,0 +1,127 @@
|
||||
---
|
||||
layout: default
|
||||
permalink: /RE101/section3/
|
||||
title: RE Tools
|
||||
---
|
||||
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
||||
|
||||
# Section 3: Reverse Engineering (RE) Tools #
|
||||
|
||||
|
||||
## Disassemblers
|
||||
|
||||
* [Ida](https://www.hex-rays.com/products/ida/)
|
||||
* Free (Used in this workshop)
|
||||
* Pro (Most Popular)
|
||||
* [Radare](https://www.radare.org)
|
||||
* [Capstone](http://www.capstone-engine.org/)
|
||||
|
||||
---
|
||||
|
||||
## Debuggers
|
||||
|
||||
* [x64dbg](http://x64dbg.com/) (Used in this workshop)
|
||||
* [Immunity](https://www.immunityinc.com/products/debugger/)
|
||||
* [OllyDbg](http://www.ollydbg.de/) (Most Popular)
|
||||
* [WinDbg](https://developer.microsoft.com/en-us/windows/hardware/windows-driver-kit)
|
||||
|
||||
---
|
||||
|
||||
## Decompilers
|
||||
|
||||
* [Snowman](https://derevenets.com/) (Integrated with x64dbg)
|
||||
* [dotPeek](https://www.jetbrains.com/decompiler/) .NET decompiler
|
||||
|
||||
---
|
||||
|
||||
## Information Gathering
|
||||
|
||||
* [CFF Explorer](http://www.ntcore.com/exsuite.php) - PE header parser (Used in this workshop)
|
||||
* [PE Explorer](http://www.heaventools.com/overview.htm) - PE inspection tool (Used in this workshop)
|
||||
* [BinText](https://www.mcafee.com/hk/downloads/free-tools/bintext.aspx) - Extract string from a binary
|
||||
* [Sysinternals Suite](https://technet.microsoft.com/en-us/sysinternals/bb842062.aspx) (Used in this workshop)
|
||||
* procmon
|
||||
* procexplorer
|
||||
* [InetSim: Internet Services Simulation Suite](http://www.inetsim.org/downloads.html) (Used in this workshop)
|
||||
* [Yara: pattern matching rule engine](https://virustotal.github.io/yara/)
|
||||
* [Wireshark](https://www.wireshark.org/download.html) - network sniffing (Used in this workshop)
|
||||
* [API Monitor](http://www.rohitab.com/downloads)
|
||||
|
||||
### Helpful Websites
|
||||
|
||||
* [virustotal.com](https://www.virustotal.com/) - free service that analyzes suspicious files and URLs
|
||||
* [malwr.com](https://malwr.com/) - Malwr is a free malware analysis service
|
||||
* [hyrbid-analysis](https://www.hybrid-analysis.com/) - free malware analysis service
|
||||
* [whois.domaintools.com](http://whois.domaintools.com/) - look up domains
|
||||
* [robtex.com](https://www.robtex.com/) - free DNS lookup tool
|
||||
* [www.debuggex.com](https://www.debuggex.com/) - Online Visual Regex Tester
|
||||
|
||||
---
|
||||
|
||||
## Support
|
||||
|
||||
* [HxD Hex Editor](https://mh-nexus.de/en/hxd/) (Used in this workshop)
|
||||
* [Python](https://www.python.org/downloads/) - used for automating tasks
|
||||
|
||||
---
|
||||
|
||||
## Tools Used in the Workshop
|
||||
|
||||
### Disassembler: IdaFree
|
||||
|
||||

|
||||
|
||||
* **Visual Modes**
|
||||
* **Graph Mode** - control flow diagram
|
||||
* **Text Mode** - default view of disassembled code
|
||||
* **Command Cheatsheet**
|
||||
* Please refer to this [Ida cheatsheet](https://securedorg.github.io/idacheatsheet.html)
|
||||
* **Common Commands**
|
||||
|
||||
| Action | Command |
|
||||
| --- | --- |
|
||||
| Jump to xref to operand | X |
|
||||
| Jump to address | G |
|
||||
| Enter comment | Shift+; |
|
||||
|
||||
---
|
||||
|
||||
### Debugger: x64dbg
|
||||
|
||||

|
||||
|
||||
**Common Commands**
|
||||
|
||||
| Action | Command |
|
||||
| --- | --- |
|
||||
| Enter comment | ; |
|
||||
| BreakPoint | F2 |
|
||||
| Step into | F7 |
|
||||
| Step over | F8 |
|
||||
| Run | F9 |
|
||||
| Edit Instruction | Space |
|
||||
|
||||
### Keyboard Layout for IdaFree and x64dbg
|
||||
|
||||

|
||||
|
||||
---
|
||||
|
||||
## Information Gathering: CFF Explorer
|
||||
|
||||
* Parses the PE headers
|
||||
* Explores Resources
|
||||
* Unpacks UPX
|
||||
|
||||

|
||||
|
||||
## Information Gathering: Sysinternals Suite
|
||||
|
||||
* advanced system utilities
|
||||
* **ProcMon** - Monitor processes/thread, files system, network, and registry activity on the system
|
||||
* **ProcExp** - Monitor processes running on the system
|
||||
|
||||

|
||||
|
||||
|
||||
[Section 2.1 <- Back](https://securedorg.github.io/RE101/section2.1) | [Next -> Section 4](https://securedorg.github.io/RE101/section4)
|
||||
Reference in New Issue
Block a user