UNDERCODE COMMUNITY
2.69K subscribers
1.24K photos
31 videos
2.65K files
81.1K links
๐Ÿฆ‘ Undercode World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE


โœจ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Malwares Detection bypass:

๐‘ด๐’Š๐’”๐’–๐’”๐’Š๐’๐’ˆ ๐‘บ๐’•๐’“๐’–๐’„๐’•๐’–๐’“๐’†๐’… ๐‘ฌ๐’™๐’„๐’†๐’‘๐’•๐’Š๐’๐’ ๐‘ฏ๐’‚๐’๐’…๐’๐’†๐’“๐’” ๐Ÿ’ก

In malware analysis, one common anti-disassembly technique is ๐’๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž๐ ๐„๐ฑ๐œ๐ž๐ฉ๐ญ๐ข๐จ๐ง ๐‡๐š๐ง๐๐ฅ๐ข๐ง๐  (๐’๐„๐‡) manipulation.

SEH is a mechanism in Windows for managing exceptions, but it can also be exploited to confuse disassemblers and debuggers. By injecting fake exception records into the SEH chain, attackers can redirect program flow, making it difficult for static analysis tools to follow the actual execution path. This redirection not only complicates reverse engineering but also disrupts debugging processes, forcing tools to misinterpret or skip over key code sections.

Ref: Ait Ichou Mustapha
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–