Post

Doing to Undo

I was going to make my next blog post about diving into a generic portable executable (PE). I quickly realized that there is a lot to learn. I started with assembly because when disassembling PEs that’s basically all you saw. I went through a series on Youtube that was recommended to me that taught me a lot. Feel free to check it out here Dr. Stroschein is a really great teacher.

Even after learning assembly I still struggled with jumping into some malware and understanding what the hell was going on. That was when I came to the realization that I need to learn this stuff inside and out to understand it. Having heard nothing but good things about MalDev Academy and the fact that they were having a 25% off sale at the time, I enrolled. This put me in a win win situation. While learning to develop malware I could reverse engineer what I’m taught. This way I gain a better understanding as to why and how threat actors build malware the way they do and I will know what to look for when reversing live samples.

Looking over the syllabus and with me not knowing much C and reversing what’s taught throughout I knew this was going to take a long time. This was going to leave a huge gap in my blog posts and when I did post again there would be a recognizable leap in knowledge. Then it dawned on me. I could post about what I learn when reversing my own code, it would help solidify my learning and hopefully help out anyone reading that wants to get into reverse engineering.

With all that said, I am starting a new category in my blog site dedicated to learning. With this new section the goal is as I learn hopefully someone else can learn with me, making their journey to reverse engineering and malware analysis a little bit easier.

Learn Practice Perfect Share

This post is licensed under CC BY 4.0 by the author.