- Mastering Reverse Engineering
- Reginald Wong
- 147字
- 2021-06-10 19:40:20
Binary analysis tools
Binary analysis tools are used to parse binary files and extract information about the file. An analyst would be able to identify which applications are able to read or execute the binary. File types are generally identified from their magic header bytes. These Magic Header bytes are usually located at the beginning of a file. For example, a Microsoft executable file, an EXE file, begin with the MZ header (MZ is believed to be the initials of Mark Zbikowski, a developer from Microsoft during the DOS days). Microsoft Office Word documents, on the other hand, have these first four bytes as their Magic Header:
The hexadecimal bytes in the preceding screenshot read as DOCFILE Other information such as text string also give hints. The following screenshot shows information indicating that the program was most likely built using Window Forms:
- 特種木馬防御與檢測技術(shù)研究
- 黑客攻防技巧
- Web安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- Mastering Kali Linux for Advanced Penetration Testing
- 反黑命令與攻防從新手到高手(微課超值版)
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- 計算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 信息安全等級保護(hù)測評與整改指導(dǎo)手冊
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- Mastering Malware Analysis
- 數(shù)字銀行安全體系構(gòu)建
- Practical Internet of Things Security
- ATT&CK與威脅獵殺實(shí)戰(zhàn)