Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Month: November 2019

x86 Assembly: Crack Challenge 1, Dynamic Analyses

November 30, 2019 rioasmara

Dear Friends, I would like write tutorial on how to do simple dynamic analyses with IDA. I will use the same executable like the previous

Continue reading

x86 Assembly: Crack Challenge 1, Make your code readable

November 27, 2019 rioasmara

Dear All, Today I am going to write about how to do dynamic analyses of our keygen challenge with IDA Pro. In order to make

Continue reading

x86 Assembly: Crack Challenge 1

November 25, 2019 rioasmara

Dear Friends, I would like to write a walkthrough of challege so that we can practice the reverse engineering more detail. I have downloaded an

Continue reading

x86 Assembly : Reference Variable

November 17, 2019 rioasmara

I would like to continue on how to get return result from a function call by using reference variable pass. We can pass variable to

Continue reading

x86 Assembly function return variable

November 15, 2019 rioasmara

Dear Friends, Today I am going to continue writing about assembly related to function return. So basically whenever you call a function and you can

Continue reading

x86 Assembly, Passing variable

November 2, 2019 rioasmara

Hi Engineers, Another important things to understand related to function call is how the variable is passed to the function. Lets see the code below

Continue reading

root#whoami

Unknown's avatarRio Asmara Suryadi is a highly experienced cybersecurity professional with over 20 years in the field, specializing in cyber defense, malware analysis, penetration testing, and security architecture across diverse industries including Oil & Gas, Banking, and Energy. He possesses a strong background in leading SOC operations, threat hunting, implementing robust security solutions, and has a notable history of software development. Rio is also dedicated to knowledge sharing, evidenced by his cybersecurity blog and his role as the founder of Beruang Cyber, a cybersecurity community in Indonesia.

Recent

  • MFT Reader: A Forensic Analyst’s Guide to Finding What Happened on Disk
  • AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught
  • Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations
  • The Silent Kill Chain: From RID Cycling to AD CS Template Injection
  • Supercharging Velociraptor with AI and Cursor
Blog at WordPress.com.
  • Subscribe Subscribed
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 43 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar