- Mastering Reverse Engineering
- Reginald Wong
- 127字
- 2021-06-10 19:40:27
Payload – the evil within
The attacker develops malware for a purpose. This is typically to cause harm to the target, maybe because of hate, for fun, for monetary or, probably, political reasons. Here are some typical malware payloads that were seen in the wild:
- Encrypting files for ransom
- Deleting all files
- Formatting drives
- Gaining full access to the system and the network
- Stealing accounts and passwords
- Stealing documents, images, and videos
- Changing specific configuration and settings
- Turning the computer into a proxy server
- Installing cryptocoin miners
- Continuously opening websites - ad or porn sites
- Installing more malware
- Installing adware
One of the conclusions that a reverse engineer includes in the report is the payload. This determines what malware actually does to the machine other than getting installed.
推薦閱讀
- 網絡安全與管理
- 攻守道:企業數字業務安全風險與防范
- 科技安全:戰略實踐與展望
- 暗戰亮劍:黑客滲透與防御全程實錄
- 深入淺出隱私計算:技術解析與應用實踐
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- Penetration Testing with Perl
- Python Penetration Testing Cookbook
- 網絡運維親歷記 (網絡運維紀實文學)
- Testing and Securing Android Studio Applications
- 黑客攻防從入門到精通
- INSTANT Apple Configurator How-to
- 博弈論與數據安全
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Securing Network Infrastructure