Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Props to the author for writing this – that being said, I felt the same way.

Very long, windy and hard to parse sentences.

For example, Part 2

> There are two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.

> Static analysis uses software tools to examine the executable without running the actual decompiled instructions in Assembly. We will not focus on this type of analysis here as we are going to focus on actual disassembled binaries instead however in future courses we will.

> Dynamic analysis uses disassemblers and debuggers to analyze malware binaries while actually running them. The most popular tool in the market today is called IDA which is a multi-platform, multi-processor disassembler and debugger. There are other disassembler/debugger tools as well on the market today such as Hopper Disassembler, OllyDbg and many more.

> A disassembler will convert an executable binary written in Assembly, C, C++, etc into Assembly Language instructions that you can debug and manipulate.

> Reverse engineering is much more than just malware analysis. At the end of our series, our capstone tutorial will utilize IDA as we will create a real-world scenario where you will be tasked by the CEO of ABC Biochemicals to secretly try to ethically hack his companies software that controls a bullet-proof door in a very sensitive Bio-Chemical lab in order to test how well the software works against real threats. The project will be very basic however it will ultimately showcase the power of Assembly Language and how one can use it to reverse engineer and ultimately provide solutions on how to better design the code to make it safer.

> In our next lesson we will discuss various types of malware.

could be written:

> There are two basic techniques that you can employ when analyzing malware: static analysis and dynamic analysis.

> Static analysis examines the executable without running it. We will not focus on this type of analysis here, however in future courses we will.

> Dynamic analysis uses disassemblers and debuggers to analyze malware binaries while running them.

> A disassembler converts an executable binary into Assembly Language instructions that you can debug and manipulate. There are many disassembler/debugger tools available such as Hopper, OllyDbg, IDA and many more. The most popular being IDA, a multi-platform, multi-processor disassembler and debugger.

> Reverse engineering is much more than just malware analysis.

> At the end of our series, we will use IDA in a fictional scenario where you will be tasked by the CEO of ABC Biochemicals – a very sensitive Bio-Chemical lab – to ethically hack his company’s bullet-proof door control-system.

> The project, while basic, will showcase the power of Assembly Language and how one can use it to reverse engineer black-box binaries and ultimately find solutions to make the code safer.

> In our next lesson we will discuss various types of malware.



> hard to parse sentences

That's because you're supposed to reverse engineer them :)




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: