A suspicious, unmarked binary just landed on your desk. Is it malware or harmless code? Your mission is to reverse-engineer it, analyze its behavior, and find out.
What you’ll learn:
  • Reverse engineering
    : Dig into the binary to understand what it’s designed to do
  • Dynamic malware analysis
    : Watch the program’s behavior in real time to identify its impact and functionality
  • Static malware analysis
    : Examine the code without execution to uncover hidden intentions and malicious payloads
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Want to add new defensive skills to your utility kit?
Login to HTB Labs today →
HTB Sherlocks - Payload_1200x675