官术网_书友最值得收藏!

Autoruns

The startup list we saw earlier in this chapter, covers registry entries, schedule jobs, and file location. The bottom line is that this tool covers all of those, including other areas we have not discussed, such as Microsoft Office add-ons, codecs, and printer monitors, as can be seen in the following screenshot:

There are 32- and 64-bit versions of the autoruns tool. The screenshot above shows all possible triggers for an executable which was based on the research of the SysInternals' authors Mark Russinovich and Bryce Cogswell. The screenshot also categorizes each autorun entry, shows the description of each entry, and indicates the file path related to the entry.

As for reverse engineers, the identification of suspected files can be determined by having knowledge of what files are common to the startup prior to the system getting compromised. Continuous practice and experience will make the reverse engineer easily identify which are good or suspected executable files.

主站蜘蛛池模板: 通化市| 察隅县| 台南市| 鸡西市| 沭阳县| 关岭| 桃源县| 孟州市| 磴口县| 宜都市| 安多县| 夏津县| 新兴县| 东山县| 遂昌县| 雅安市| 涟源市| 鄂尔多斯市| 凉山| 高邮市| 临沭县| 县级市| 青川县| 惠州市| 辽源市| 大宁县| 曲靖市| 大关县| 双城市| 双牌县| 施甸县| 天镇县| 定远县| 温州市| 南乐县| 金湖县| 新田县| 阳谷县| 蚌埠市| 井冈山市| 台州市|