Ground Zero: Part 3-3 – Reverse Engineering – Bypassing Breakpoint Detection – ARM64

A very common difficulty often faced by fellow reverse engineers is defeating anti-debugging measures. While it is important to many proprietary vendors to make their code as difficult to debug … Continue reading “Ground Zero: Part 3-3 – Reverse Engineering – Bypassing Breakpoint Detection – ARM64”

Active Directory Penetration Dojo – AD Environment Enumeration -1

Hi everyone, we’ve discussed basics of Active Directory and different servers in AD in previous blog posts of this series. If you’ve not yet read that, please find that here … Continue reading “Active Directory Penetration Dojo – AD Environment Enumeration -1”