- Mastering Reverse Engineering
- Reginald Wong
- 242字
- 2021-06-10 19:40:26
Media storage
Network administrators are very restrictive when it comes to using thumb drives. The primary reason is that external storage devices, such as USB thumb drives, CDs, DVDs, external hard drives, and even smartphones are all media in which malware can store itself. Once a storage device gets mounted to a computer, it serves like a regular drive. Malware can simply drop copies of itself to these storage drives. Similar to network worms, these are worms that depend on the user to run the malware. But with the Windows Autorun feature turned on, malware may execute once the drive is mounted, as can be seen in the following screenshot:

The previous image is the default dialog encountered when inserting a CD drive containing setup software.
The autorun.inf file in the root of a drive contains information on which file to automatically execute. This is used by software installers stored in CDs so that, when the disk is inserted, it automatically runs the setup program. This is abused by malware by doing these steps:
- Dropping a copy of its malware file in removable drives
- Along with its dropped copy, it generates an autorun.inf file that points to the dropped executable file, as can be seen in the following example:

The autorun.inf for the VirtualBox setup autoplay dialog shown previously contains the text as shown in the previous screenshot. The open property contains the executable to be run.
- 信息安全導(dǎo)論(在線實驗+在線自測)
- Learning Python for Forensics
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- CSO進階之路:從安全工程師到首席安全官
- 網(wǎng)絡(luò)空間安全:管理者讀物
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- Learning Devise for Rails
- 從實踐中學(xué)習(xí)Kali Linux滲透測試
- Web安全之深度學(xué)習(xí)實戰(zhàn)
- 信息安全等級保護測評與整改指導(dǎo)手冊
- Learning Pentesting for Android Devices
- 隱私保護機器學(xué)習(xí)
- 信息組織
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用
- BeagleBone for Secret Agents