
Reverse-Engineering 2
Process analysis tooling, network isolation for safe dynamic analysis, packers and unpacking strategies.
Deep-dive posts, investigations, and walkthroughs focused on defenders, learners, and tinkerers. No fluff—just practical knowledge and repeatable steps.

Process analysis tooling, network isolation for safe dynamic analysis, packers and unpacking strategies.

Topologies, IP addressing, DNS, TCP/UDP, NAT, and troubleshooting fundamentals.

Sessions, processes, and services—mapped to how Windows actually runs.

Introduction to the field and identifying suspicious events, tooling, and checks.

A practical tour of Windows Registry concepts and hives.

Notes on credential access, weaponizing PowerShell, and local privilege escalation.

Understanding client-side sinks and defenses for DOM-based XSS.

Linux firewall foundations with examples and common rules.

From PE format and strings to sandboxing and indicators.

Bare-metal iDRAC controller and VMware ESXi hypervisor installation.

Sessions, processes, and services explained with real OS behavior.

LAN vs WAN, addressing, DNS, TCP/UDP, NAT, and more.