This blog post is the second part of my two-part post on Regin’s Stage 4 (32-bit) dispatcher module. In this second part, I will discuss the Regin plugin framework hosted in the dispatcher module. I will also discuss how knowledge of Regin’s plugin framework can be used — and was used — to link a piece of malware to the Regin platform.
more here........http://securityintelligence.com/understanding-regins-plugin-framework-part-2/#.VP9_6_zF-So
Here is Part 1 for those who have yet to read it.......http://securityintelligence.com/reviving-the-regin-dispatcher-module-part-1/#.VP-BQfzF-So
more here........http://securityintelligence.com/understanding-regins-plugin-framework-part-2/#.VP9_6_zF-So
Here is Part 1 for those who have yet to read it.......http://securityintelligence.com/reviving-the-regin-dispatcher-module-part-1/#.VP-BQfzF-So