ANTI-DISASSEMBLY TECHNIQUES

Disassembler be like…

DISASSEMBLY ALGORITHMS

THE TECHNIQUES

Jump Instructions with the Same Target

Before

Solution-

After

Jump Instruction with a Constant Condition

Impossible Disassembly

Return Pointer Abuse

Misusing Structured Exception Handlers

Thwarting Stack-Frame Analysis

--

--

--

Security Analyst @IBM https://www.linkedin.com/in/preet-kamal-b61385132/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Building a Continuous Integration Workflow for CUDA Applications on Windows

kaisa emotional manipulators ko pahchaney.

SpiderDAO-Happy 1st Anniversary!

SpiderDAO Ecosystem

Top 10 Most Commonly Used Programming, Scripting, and Markup Languages

top-down view of the feet and legs of a person sitting on a rooftop overlooking a parking lot

Team managed, or Company managed — which jira project type is best suited for me?

12+ Factors for Containerized UI Microservices

50% Reduction in Total cost of Identity Access Management

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Preet kamal

Preet kamal

Security Analyst @IBM https://www.linkedin.com/in/preet-kamal-b61385132/

More from Medium

SOC168 — Whoami Command Detected in Request Body

abuseiodb find 61.177.172.87

Exploiting XXE to retrieve files

What are CTFs or Capture The Flag?

Installing and playing Blazblue:CF on Linux