Review of reverse engineering (i.e. software reversing) tools. Advantages and disadvantages, alternative solutions. Reverse engineering or software reversing, is a set of techniques use to analyze closed source software in order to extract seemingly unavailable information, e.g. algorithms, hidden access passwords (e.g. to databases), information on how certain files are encrypted, and so on. Reverse engineering is used for example in the fields of software analysis for potential security vulnerabilities (exploitation), malware analysis (antivirus developers) or software and games localization. Advanced software analysis requires the knowledge of examined files structure, so most often a knowledge of executable files formats is required, Portable Executable for Windows system or ELF format for Linux type systems. It is also required to know basis of assembler for 32 and 64 bit platforms, in order to understand properly compiled code in closed-source software, its structure and widely used conceptions and software constructions transformed into binary data. Even having appropriate knowledge, we will not be able to use it without proper tools. In this article, I'd like to present dedicated tools, used in reverse engineering, divided into categories. The majority of the dedicated tools, divided into categories presented here, qualify as a material for separate articles; however, it was my idea to present as many types of software as possible to show a variety of uses. Complicated character of reverse engineering software and the process of its creation is often connected with the fact that those programs are also expensive, but I tried to present alternative solutions and free equivalents of presented examples.

Identifiers There is a wide variety of both programming languages and compilers. Apart from applications created in script languages, we can differentiate applications compiled to the processor's native code. Apart from that, there is a number of methods of protecting applications and their resources, and all of that affects the final result of binary file image on disk. If we are not sure what the software that we are looking at was created with, as we have no expertise in distinguishing characteristic features in compiled files (section names, imported libraries, etc.), using identification (or detectors), tools that have signature base of popular compilers, program and cryptographic libraries or application security systems, is worth trying. A quick analysis will let us decide what our next step should be (e.g. unpacking the application)

Detect It Easy DIE detector has a database of most popular security systems, including exe-packers, exe-protectors as well as signatures of popular compilers and linkers. Additionally it has a simple built-in script language, that allows us to add new signature definitions quickly. A PE executable file structure viewer is also available. Image 1. File detector Detect It Easy Website http://ntinfo.biz Licence Freeware Advantages Built-in script language

PE file structure viewer

Plug-ins system

Updated regularly

Plug-ins for HIEW i CFF Explorer editors

Windows, Mac OS X and Linux versions Disadvantages Small signature base Alternatives Exeinfo PE – Polish author's similar detector - http://www.exeinfo.xn.pl

ProtectionID Detector ProtectionID was created to detect games security systems. It has a vast base of signatures from all possible security systems, compilers, and linkers. Even though user interface may not be the best looking, it does the job perfectly and is updated very often. Image 2. ProtectionID file detector Website http://pid.gamecopyworld.com Licence Freeware Advantages Large signature base

Updated very often Disadvantages Hardly intuitive interface

YARA GUI YARA GUI is a Windows UI frontend for the popular binary pattern matching library and format called YARA. Image 27. YARA GUI signature detector Website http://sigint9.github.io/yaragui/ Sources https://github.com/sigint9/yaragui Licence Freeware Advantages Support for highly popular YARA signature format

Simple interface

Entropy generator built-in Disadvantages None YARA signatures http://sigint9.github.io/yaragui/

Disassemblers and decompilers With knowledge about what we are dealing with or, to be precise, what programming language and compiler this application was created with, we begin analysis in disassembler or decompiler. It is their task to analyze compiled, binary file and display its code and structure in a way easy for a human to understand. Thanks to the process of disassembling and decompiling we will know all the functions of the application, what text strings are inside and what fragments of code references to them, what outside functions of the operating system are used by the application or which functions are exported (e.g. in the case of DLL dynamic libraries). Disassemblers job is to depict application's code in the for of low-level assembler, so if analyzed software was written in C++, Delphi, Visual Basic or any other high-level language compiled to native code, the disassembler will show us its object code in the form of x86 or x64 assembler code. Decompilers are able or try really hard to recreate original high level code from the code of compiled applications. As you can guess, recreating a high level language code, e.g. C++ with recognition of data structures, types and construction of programming language from compiled code of assembler is a very complicated process, so the amount of tools that allow such action is very small and if they are good, they are in the same time very expensive. Decompilers can be divided basing on categories of software that they are able to analyze. Compilers of languages like e.g. C# (.NET Framework family), Visual Basic, Java generate object code in the intermediate form, meaning that this code is not directly executed by processor like x86 code, it is a pseudo code (so called P-Code), that is executed by a virtual machine of those programming systems (to run we need e.g. .NET Framework or JVM installed). Such output code, because of its simplicity and most information stored in the form of pseudo instructions and metadata, resulted in the fact that decompiling in such cases is much more simple than decompiling x86 or x64 code. This caused creation of many dedicated decompilers, that became a nightmare of programmers writing in those languages, as it was very easy for anyone to take a peek at unprotected software, practically it's the version with source code wide open. That was short introduction, now it is time for a list of most popular disassemblers and decompilers and their usage examples.

IDA and Hex-Rays IDA that is Interactive DisAssembler in an undpisupted king among tools used in reverse engineering. IDA is a disassembler and debugger with built-in code analysis for over 60 types of processors. It has its own script language, large base of signatures of the most popular programming libraries as well as support for plug-ins that additionally enhance functionality e.g. by support for Python scripts. Image 3. IDA's disassembler and decompiler's window The most known and valued plugin for IDA is Hex-Rays decompiler, that supports decompilation of x86, x64 and ARM codes, which is invaluable analysis tool. IDA also has built-in debuggers for many hardware platforms, which makes this a perfect multitool for analysis of various executable files. Website https://www.hex-rays.com Licence Commercial from 449 EUR and free demo version. Advantages Supports large numbers of processor types

Built-in signatures of popular programming libraries

Large configuration possibilities

Built-in debuggers

Plugins system

Script language

Windows, Mac OS X and Linux versions Disadvantages Price

Lack of good, free alternative solutions Plugins FindCrypt – cryptographics algorithm signatures search engine - http://www.hexblog.com/?p=27

IDAStealth – hiding from antidebug methods - https://github.com/nihilus/idastealth

BinDiff – comparing databases, searching for code differences - http://www.zynamics.com/bindiff.html

Ghidra new Ghidra is a new and free tool directly from the US intelligence agency NSA for the disassembly and decompilation of binary applications. One of the most outstanding features of Ghidra is the built-in decompiler, which in some cases, such as ARM code analysis, can handle code reconstruction much better than the HexRays decompiler. Image 28. Ghidra's disassembler and decompiler's window It may not be entirely up to the functionality of HexRays at the moment (remember that Ghidra is a new project), but tools such as decompilers require a lot of work and it is rare to see a new product that someone offers for free. Website https://ghidra-sre.org/ License Apache License 2.0 Advantages Free license!

Supports large numbers of processor types

A decompiler that sometimes performs much better than that of HexRays

The ability to collaborate several people on the same project

Plugin system and its own API interface

Windows, Mac OS X and Linux versions Disadvantages Slightly outdated interface

Controversy over the very fact that it was released by the NSA (some will sniff out a conspiracy everywhere) Plugins https://gist.github.com/adulau/a3a0eefb7828d52747a9d247a82eeeef

.NET Reflector When you must face analysis of software created in a programming language based on .NET Framework, e.g. C# or VB#, .NET Reflector decompiler will prove invaluable help. With its help, you will be able to quickly and efficiently take a peek at application's structure and code. Reflector's big advantage is the fact that it has a small but very useful plugin base, with available, for example a plugin that allows recreating of the whole project for Visual Studio, from decompiled application. In addition, integration with Microsoft Visual Studio allows for simultaneous debugging of own code and code of closed libraries. Because of simplicity of decompiling programs created for .NET Framework, many security tools were created, of course we are talking here about obfuscators that remove meta data from compiled programs, are able to modify IL code, encrypt text strings etc. If we come across such a program, we should familiarize ourselves with de4dot deobfuscator, that is able to automatically remove protections used by dozens of obfuscator types. Image 4. .NET Reflector decompiler window Website https://www.red-gate.com/products/dotnet-development/reflector/ Licence Commercial from 99 USD and free limited time trial Advantages Excellent presentation and navigation over decompiled code

Decompiling to many output languages C#, VB#, IL

Decompiling and debugging straight from Microsoft Visual Studio

Many useful plugins, e.g. Reflexil patcher Disadvantages No support for protected applications (no deobfuscator)

Slow start (online licence check) Plugins Reflexil – .NET code editor - http://reflexil.net

Deblector – debugger - https://deblector.codeplex.com

ReflectionEmitLanguage – code generator IL - http://reflectoraddins.codeplex.com/wikipage?title=ReflectionEmitLanguage

Plugin base – https://archive.codeplex.com/?p=reflectoraddins

dnSpy new A real workhorse for .NET decompilation, with built-in IL code editor and debugger. Above all of that, it's free with intuitive and modern interface design. Image 25. dnSpy decompiler and debugger window Website https://github.com/0xd4d/dnSpy Licence GNU GPL v3 Advantages Excellent work speed

Simple IL code editor

Built-in debugger

Modern look Disadvantages None

Java Decompiler JD-GUI or Java Decompiler is a decompiler for Java applications, hence its name. It allows for viewing of compiled units code*.class or whole *.jar bundles. It contains very useful search engine with filters that allow for searching by names, types, constructors, fields, methods and text strings. Apart from stand alone application there are also plugins for programming environment Eclipse and IntelliJ IDEA, that allow for viewing code of compiled modules. If you've ever used or you keep using well-known decompiler JAD (that was discontinued in 2001) then it's about time for an update, not only does JD-GUI support new elements of Java language, but also navigation over decompiled project is very easy and fun. It also needs to be mentioned that, just like with .NET applications, that have been protected with obfuscators, Java applications can be protected and then decompiler functioning is limited or even impossible. Image 5. Java Decompiler (aka JD-GUI) Website http://jd.benow.ca Licence Freeware Advantages Intuitive navigation over decompiled code

Plugins for Eclipse and IntelliJ IDEAenvironment Disadvantages No support for protected application (no deobfuscator)

No disassembly to IL in case of finding errors

JustDecompile Free alternative for commercial.NET Reflector developed by Telerik known for UI components. Free doesn't mean worse, it has built-in reference search engine, generating projects from decompiled sources ability as well as support for plugins, including de4dot deobfuscator plugin. Image 6. Just Decompile Decompilatior Website https://www.telerik.com/products/decompiler.aspx Licence Freeware Advantages Support for own plugins

Generating output code in C#, VB# and IL

Visual Studio plugin Disadvantages It is a bit robust comparing to .NET Reflector Alternatives dotPeek – free decompiler from JetBrains - https://www.jetbrains.com/decompiler/

Simple Assembly Explorer – .NET editor and disassembler - https://github.com/wickyhu/simple-assembly-explorer/releases

DisSharp – free decompiler - http://netdecompiler.com

ReFox Decompiler for applications created with database programming environment Visual FoxPro from Microsoft. This is a very niche solution for equally niche environment, but there are no alternative solutions that would allow for analysis of those application and those that do exist have been discontinued and don't support latest versions of VFP applications. ReFox allows for decompiling of classes, viewing forms and built-in data. Image 7. ReFox decompiler Website http://www.refox.net Licence Commercial from 290 EUR and demo version. Advantages Decompiling of classes

Form viewer

Restoration of Visual FoxPro projects Disadvantages A bit outdated interface

Sometimes can't handle decompiling of code

VB Decompiler Applications created with Visual Basic 5 and 6 are all in the past now. However, internal structure of code based on P-Code was a cradle for .NET technology and from the very beginning it's been causing problems with code analyze, as there were no dedicated tool for its analyze. We can say that VB Decompiler was created a bit too late for the market's needs, but is irreplaceable when analyzing Visual Basic applications (EXE, DLL as well as OCX controls) compiled to P-Code (Visual Basic also allowed from compiling to x86 code). Image 8. VB Decompiler Website https://www.vb-decompiler.org Licence Commercial from 99 EUR, as well as lite version. Advantages View on code forms and events

Plugins system

Disassembly of native code x86 Disadvantages Limited navigation for decompiled code Alternatives VBDIS4 – decompiler for VB4 - http://vbdis4.angelfire.com

IDR Disassembler and decompiler IDR or Interactive Delphi Reconstructor is a tool meant only for application analysis in popular Delphi environment. It is a very useful tool comparing to e.g. IDA because it can analyze internal structures of Delphi application, has built-in form viewer, that allows for fast and easy finding of events assigned to controls on the form (e.g. button1.OnClick). IDR has vast databases of signatures of standard Delphi environment libraries in all available versions, so in output deadlisting we will see friendly function names. Image 9. Disassembler and decompiler for Delphi - IDR Website http://kpnc.org/idr32/en/ Licence Freeware with optional paid current copy (unknown terms and conditions, author couldn't be contacted). Advantages Delphi form viewer with controls events browser

Export of map with names of functions and variables (e.g. for IDA or debugger)

Built-in signatures of all versions of Delphi environment Disadvantages Irregular updates

Unclear terms of access to latest versions

Debuggers Every programmer sooner or later gets to know the functioning of a debugger in his favourite programming environment. Thanks to debugger we are able to track application running in real time, see how instructions affect contents of memory or variables and detect potential errors. However debugging of our own software, when we have access to information about source code and usually debug high-level code, straight from programming environment, is a piece of cake compared to debugging of application without access to source code. This is where dedicated debuggers, with advanced analysis of binary application structures, come in handy, but their use requires knowledge of low-level languages as well as basis of functioning of processor, for which this application was compiled.

OllyDbg This is de facto a standard debugger for Windows in the world of reverse engineering (alongside built-in debugger for IDA disassembler). It has capabilities of application code analysis and allows for interference with almost every aspect of application running. Other interesting functions include OllyDbg that allows for conditional code tracing, has vast plugins database, including those hiding its presence from anti-debug methods (Phant0m plugin), or plugins that allow for controlling of debugger running from the script level (ODbgScript plugin), while those scripts, most often used for unpacking of unprotected applications, come in hundreds. Popularity of OllyDbg is obvious with the fact, that no other debugger, including legendary SoftICE system debugger has had so many plugins and modified versions like OllyDbg. It is interesting that a special version OllyDbg was created under the name of Immunity Debugger with built-in Python script support, meant for analyzing malware and creating exploits There are currently two versions of OllyDbg, old with number 1.10, that has the most extensions and new version 2.01 that is becoming more and more popular. It is good news that a new 64-bit version is being developed because of the popularity of 64-bit operating systems. Image 10. OllyDbg v1.10 Debugger Image 11. The same code in OllyDbg 2.01 debugger Website http://www.ollydbg.de Licence Shareware for free, according to website (upcoming freeware?) Advantages Outstanding analysis of application code

Many configuration options

Vast database of plugins and scripts Disadvantages 64 bit version is still being developed Plugins Phant0m – Hiding presence of debugger - http://www.woodmann.com/collaborative/tools/index.php/PhantOm

ODbgScript – script language - http://odbgscript.sourceforge.net

OllyDumpEx – dumper - http://low-priority.appspot.com/ollydumpex/ Alternatives WinDbg – Microsoft system debugger - https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx

GDB – debugger for Linux - http://www.gnu.org/software/gdb/

bugdbg – 64 bit debuggers by Polish author - http://pespin.w.interia.pl

x64dbg new x64dbg are basically two debuggers, one dedicated for 64 bit software debugging and second for 32 bit applications. It features modern interface, plenty of configuration options, internal engine based on modern programming libraries like TitanEngine, Capstone Engine, Keystone Engine. Number of supported features is really impressing, plugins, built-in scripting language, Yara signatures scanning, built-in decompiler and many more. And it's development is very active. Taking the fact that 64 bit OllyDbg never left the development stage, x64dbg has become de facto standard debugger for 64 bit applications. Image 26. Debugger x64dbg Website http://x64dbg.com Sources https://github.com/x64dbg/x64dbg License GNU GPL v3 Advantages Modern interface

Modern programming libraries used

Configuration flexibility

Plugins

Built-in scripting language

Build-in decompiler (Snowman) Disadvantages It doesn't have as many plugins as OllyDbg

Popular scripting language ODBScript with thousands of scripts is not supported Plugins Available at https://github.com/x64dbg/x64dbg/wiki/Plugins Alternatives WinDbg – Microsoft system debugger - https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx

bugdbg – 64 bit debuggers by Polish author - http://pespin.w.interia.pl

DILE Debugger for .NET Framework applications. It is quite a robust tool, but sometimes invaluable. It looks a bit like Visual Studio built-in debugger, I'm mentioning it only because it is one of very few debuggers for .NET applications without access to source codes, there are also plugins for .NET Reflector for the purpose of debugging (Deblector plugin). Image 12. .NET – DILE application debugger. Website https://sourceforge.net/projects/dile/ Licence GNU GPL Advantages It exists Disadvantages Lots of it

Complicated user interface

Hex editors If you have analyzed your application in disassembler, traced its running in debugger, there may be a need to interfere with program code in order to input corrections or to change some text strings, fix values or other information included in application's binary file. For that purpose hex editors are used. At times when I used to read games magazine Top Secret, I associated hex editors only with save games modification, as readers were sending numerous offsets (addresses in a file) as well as values that needed to be changed in save files, e.g. to get a certain amount of cash or other resources in the game. There are many hex editors on the market, with numerous different functions and applications, like e.g. built-in view over data structure (meaning that this hex editor can visually display for example bitmap elements or internal structure of exe file). An example of such an editor is e.g. well known WinHex, that is used in data retrieval (it contains built-in support for many system files), however, in my opinion, it is not very good for works connected with 'digging' in application's binary files, despite the fact that it has appropriate functions.

HIEW This is my number one for hex editors, I cannot imagine my work without it. It is seemingly an old console application, but in reality it is a true beast. HIEW (by Hacker’s View) is a hexeditor, disassembler that supports architecture of x86, x64, ARM V6 processors, it also supports NE, LE, PE/PE32+, ELF/ELF64 files. This program has vast user database has been developed since 1991 and updates are regular. Thanks to HIEW, we are able not only to edit binary file data but if that is an application, also its code. Built-in disassembler allows for navigation over the code and its functions as well as to easily modify existing instructions with the help of built-in assembler, which means that you don't have to know hex codes by heart. Instead, it is enough to write e.g. mov eax,edx and HIEW will automatically compile that instruction and insert it into binary file. HIEW is also able to repeatedly replace tools like IDA, if we have a simple task to do, its greatest advantages are its ability to operate very fast and built-in code analysis and direct modification options. Image 13. HIEW hex editor and disassembler Website http://www.hiew.ru Licence Commercial from 19 USD and demo version. Advantages Built-in disassembler and assembler for many types of processor architectures

Support for many formats of exe files

Plugins system Disadvantages No overlaps Alternatives BEYE (Binary Eye) – free, console hex editor i disassembler - https://sourceforge.net/projects/beye/

HT Editor – free hex editor and disassembler - https://sourceforge.net/projects/hte/

Hex Workshop Windows hex editor with many useful options, file comparison, bit operations on code blocks, generating checksums, contains structure view for the most popular types of files. Image 14. Hex Workshop hex editor Website http://www.bpsoft.com Licence Commercial from 89.95 USD and time-limited version. Advantages Advanced bit operations on data blocks

Possibility of disc editing

Built-in checksum and cryptographic shortcut calculator

Automatic search for all text strings Disadvantages Messed up graphic interface

Expensive, compared to alternatives Alternatives 010 Editor – advanced hex editor - http://www.sweetscape.com/010editor/

HxD Free hex editor with basic functions and options like edition, search, file comparison. It allows for simultaneous work with multiple files. It is also possible to open memory of different processes and gain direct access to discs. Image 15. HxD Hex editor Website http://mh-nexus.de/en/hxd/ Licence Freeware Advantages Simplicity

Simultaneous editing of multiple files

Ability to edit memory processes and disk data

Data export to format of programming files

Built-in checksum and cryptographic shortcut calculator Disadvantages No advanced modification options (like e.g. XOR operations on data blocks)

Minimalistic interface Alternatives Hex Editor Neo – free hex editor - https://www.hhdsoftware.com/free-hex-editor

Resource editors Characteristic feature of Windows applications is the fact all resources like icons, images, forms, localized texts, as well as other information, can be saved in PE file structure, within a special area called resources. Those data are saved when linking. As all application files are saved in one EXE or DLL output file, if there is a need to change those information and if their size is unchanged, we will be able to modify them using hex editor, however, if we need to add new data or set different that have a larger size (e.g. longer text or another image), because of the structure of those data we will have to use proper resource editor. Apart from modifications in application's resources, resource editors are also used just for taking a peek what additional data are stored in the application's file.

Resource Hacker FX Resource Hacker used to be one of the most popular resource editors, but it has been discontinued for a long time, despite that fact of its popularity, new patches have been created that gave this editor a new life. Image 15. Resource Hacker FX resource editor Website https://rammichael.com/resource-hacker-fx Licence Freeware Advantages Processing speed

Ability to manipulate data on script language resource level. Disadvantages Patches don't change outdated functions

No preview of Delphi forms

No coloring syntax for XML elements (like e.g. manifests) Alternatives XN Resource Editor – free resource editor - http://www.wilsonc.demon.co.uk/d10resourceeditor.htm

Resource Tuner Excellent resource editor from the creators of PE Explorer. It contains built-in unpackers, e.g. for UPX or FSG compressor, resource edition can be also done with use of friendly wizards. Resource Tuner has also built-in scanner that allows for scanning of any given catalogue for resources of a specific type. Image 16. Resource Tuner resource editor Website http://www.heaventools.com/resource-tuner.htm Licence Commercial from 49.95 USD and 30 days trial version. Advantages Friendly user interface

Support in the form of wizards

Built-in unpacker Disadvantages No low-level structure resources (script) edition Alternatives Resource Builder – similar editor - http://www.resource-builder.com

Reverse engineering requires specialized tools for specific purposes, other than standard ones like disassemblers, decompilers and debuggers – there are many dedicated tools that help in analysis of applications as well as editors, some of them you will find below.

PE-Bear Excellent browser and file structure editor, with built-in simple disassembler, PE file compare basing on values from all structures (solution that is unique on a world scale), detection of popular exe-packers / exe-protectors, hex editor and graphic visualization of section structure. Tool created by a Polish programmer (yes, you got it right) is perfect for low-level analysis of PE/PE32+ files, created mostly for the purpose of malware analysis. Image 18. PE-Bear editor Website https://hshrzd.wordpress.com/pe-bear/ Licence Freeware Advantages Unique functions

Simple edition of PE/PE32+ file structure

Detection of popular exe-packers and exe-protectors based on signatures

Windows and Linux versions Disadvantages Simple disassembler (too simple)

No configuration options Alternatives CFF Explorer – PE editor - http://www.ntcore.com/exsuite.php

Cerbero Profiler - advanced profiler - https://cerbero.io/profiler/

PE Insider –from the author of CFF Explorer and Cerbero Profiler - http://cerbero.io/peinsider/

PE Explorer – edytor PE - http://www.heaventools.com

PeStudio An interesting tool that apart from displaying basic information about exe file, has also a set of rules that can detect incorrect elements in the structure of exe file (all sorts of anomalies) as well as elements that can potentially indicate that the file has been infected. Very useful tool for those who work with PE files every day. Image 19. PeStudio executable files analyzer Website https://www.winitor.com Licence Free for non-commercial use. Advantages Detection of anomalies in exe files

Convenient PE file structure viewer Disadvantages Some rules are too strict

dirtyJOE Advanced editor for compiled Java files. Unique tool, developed by Polish author, for code modifying, with built-in disassembler and assembler, this editor allows also for modifying all structures within compiled *.class files. dirtyJOE is useful when we want to modify protected files (after using obfuscator for Java), when traditional methods of decompilation, modification and recompilation fail, dirtyJOE proves irreplaceable. Image 20. dirtyJOE Java files editor Website http://dirty-joe.com Licence Free for non-commercial use. Advantages Instructions disassembler and assemblerJVM

Adding and editing fields like e.g. text strings

32 and 64 bit versions

Plugin for Total Commander Disadvantages Raw interface

Uncomfortable code editor

Extractors and rippers Application files, just like application bundles, can contain additional information, like e.g. hidden icons, sound files, libraries, etc. If we want to have a quick check of what's inside the application or e.g. inside the whole installation package of software, we must use appropriate extractor or ripper.

Universal Extractor This software allows for the extraction of files from archives, self unpacking archives, and installers. This is very useful when we want to learn what's inside the installer package, where often we can find some additional installation scripts or auxiliary libraries, without actually running the installation process. Image 21. Universal Extractor Website http://legroom.net/software/uniextract Licence Freeware Advantages Support for archives (including unpacking)

File extraction from popular installing systems Disadvantages Haven't been updated for a long time

Sometimes alternative solutions are needed for newer versions of installing systems Alternatives innounp – extractor of popular installing system- InnoSetup - http://innounp.sourceforge.net

MultiExtractor Extractor of all kinds of multimedia files, like graphic files, icons, sound files, movies, 3D models, Flash animations. Dynamic data unpacking from processes memory and simple viewer make this software a very interesting tool, when we want to take a quick peek what's inside application files. Image 22. MultiExtractor Website https://www.multiextractor.com Licence Commercial from 19 USD and demo version. Advantages Extraction of numerous graphic file formats

Extraction from processes' memory

Recognising popular file formats Disadvantages No new file formats added for quite a long time

Can sometimes freeze, especially with large number of files. Alternatives AllMedia Grabber – similar extractor - http://www.fotissoftware.com/multimedia.htm

Virtual environments Analysis of unknown software can be risky, especially when we have to run the software and just doing this with debugger can end up badly if the software runs a thread in the background which can install a rootkit or other malware. It is a good idea to be protected against such accidents and run suspicious software under the supervision of a virtual machine.

VMware The most famed software that creates a virtual environment, where we can install any operating system and test software without unnecessary risk. Image 23. VMware Workstation virtual environment Website https://www.vmware.com/products/workstation/ Licence Commercial from 225 EUR and free trial version. Advantages Compatible with many operating systems

Uses virtual hardware to boost efficiency Disadvantages Requires good hardware and can freeze the whole system on slower computers. Alternatives VirtualBox – free equivalent from Oracle - https://www.virtualbox.org

Parallels Desktop – virtualization for Mac OS - https://www.parallels.com/eu/products/desktop/

Sandboxie This software creates virtual sandbox for applications that are run. All operations within virtual sandbox are isolated and have no influence over the system. This is a perfect solution for debugging or quick test of correctness of application's running without fear for side effects. Image 24. Sandboxie virtual sandbox Website https://www.sandboxie.com Licence Commercial from 15 EUR and free trial version. Advantages Perfect isolation of run applications, without the need to use dedicated virtual environments. Disadvantages A bit outdated user interface Alternatives WinJail – chroot for Windows - http://www.winquota.com/wj/index.html

This is not the end, this is just the beginning... Presented tools are just a part of what can be found on the market. There many other free or experimental projects as well as those that were abandoned at some point but are still worth a look. I encourage you to discover secrets of reverse engineering and if you should find something interesting - write me an email.

Subscribe to newsletter to receive notifications about new articles: