Reversing Malware Part 8: Using Strace and Ltrace
Videos from Reverse Engineering Linux 32-bit Applications
-
Reversing Malware Part 7: Setting Up a Sand Box Continued -
You are watching this now -
Reversing Malware Part 9: Using Evan’s Debugger -
Reversing Malware Part 10: Using GDB Debugger