
So not wasting more time here is brief introduction to Ollydbg.Īs the name itself suggests OllyDbg is debugger and disassembler for Microsoft Windows PE(Portable Executable) files (32-bit). But i would recommend that for now you should start with ollydbg you can switch to immunity later if you want when you get comfortable with ollydbg. This tutorial will also be applicable to immunity debugger. But ollydbg is more popular because its old and have long list of plugins. Immunity is very similar to ollydbg in usage. There is one more popular debugger named immunity debugger with support for python scripting. You will be using it a lot during malware reverse engineering. First you should get familiar with Ollydbg.



I will explain debugging types user mode and kernel mode debugging later. Ollydbg is the most popular user mode debugger among Malware analysts and reverse engineers. To start with malware analysis you need to know about debugging.
