- Mastering Reverse Engineering
- Reginald Wong
- 167字
- 2021-06-10 19:40:24
The registry system
In Windows, the registry is a common database that contains system-wide configuration and application settings. Examples of stored information in the registry are as follows:
- Associated programs that execute specific files:
- DOCX files are associated with Microsoft Word
- PDF files are associated with Adobe Reader
- Associated icons to specific files and folders
- Software settings:
- Uninstall configuration
- Update sites
- Ports used
- Product IDs
- User and group profiles
- Printer setup:
- Default printer
- Driver names
- Designated drivers for specific services
The registry is stored in hive files. The list of hive files is also found in the registry itself, as can be seen in the following screenshot:

Writing and reading information from the registry requires using Windows registry APIs. The registry can be viewed visually using the Registry Editor. Entries in the right pane of the Registry Editor are the registry keys. On the left pane, the registry values are found under the Name column, as can be seen in the following screenshot:

推薦閱讀
- unidbg逆向工程:原理與實踐
- INSTANT Netcat Starter
- Kali Linux Social Engineering
- Practical Network Scanning
- 網絡安全意識導論
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 數字化轉型浪潮下的數據安全最佳實踐指南
- Kerberos域網絡安全從入門到精通
- 物聯網安全滲透測試技術
- 華為防火墻實戰指南
- 實用黑客攻防技術
- Bug Bounty Hunting Essentials
- 聯邦學習原理與算法
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- 云安全深度剖析:技術原理及應用實踐