官术网_书友最值得收藏!

How it works...

This scenario simulates tampering with a file and then utilizing similarity hashing to detect the existence of tampering, as well as measuring the size of the delta. We begin with a vanilla Python executable and then tamper with it by adding a null byte at the end (step 1). In real life, a hacker may take a legitimate program and insert malicious code into the sample. We double-checked that the tempering was successful and examined its nature using a hexdump in step 2. We then ran a similarity computation using similarity hashing on the original and tempered file, to observe that a minor alteration took place (step 3). Utilizing only standard hashing, we would have no idea how the two files are related, other than to conclude that they are not the same file. Knowing how to compare files allows us to cluster malware and benign files in machine learning algorithms, as well as group them into families.

主站蜘蛛池模板: 黄龙县| 荔波县| 涡阳县| 庆阳市| 晴隆县| 象州县| 宾阳县| 蒲江县| 克什克腾旗| 邯郸县| 西昌市| 丰县| 昭通市| 祁东县| 宁安市| 定西市| 长治县| 镇康县| 克什克腾旗| 南城县| 吴桥县| 会泽县| 穆棱市| 东乌珠穆沁旗| 黄龙县| 开封县| 金堂县| 八宿县| 大英县| 鄢陵县| 三门峡市| 疏勒县| 高雄县| 历史| 宜兰市| 石景山区| 察雅县| 恩平市| 柳江县| 郸城县| 广水市|