官术网_书友最值得收藏!

Autoruns

The startup list we saw earlier in this chapter, covers registry entries, schedule jobs, and file location. The bottom line is that this tool covers all of those, including other areas we have not discussed, such as Microsoft Office add-ons, codecs, and printer monitors, as can be seen in the following screenshot:

There are 32- and 64-bit versions of the autoruns tool. The screenshot above shows all possible triggers for an executable which was based on the research of the SysInternals' authors Mark Russinovich and Bryce Cogswell. The screenshot also categorizes each autorun entry, shows the description of each entry, and indicates the file path related to the entry.

As for reverse engineers, the identification of suspected files can be determined by having knowledge of what files are common to the startup prior to the system getting compromised. Continuous practice and experience will make the reverse engineer easily identify which are good or suspected executable files.

主站蜘蛛池模板: 榆树市| 广丰县| 天气| 盐池县| 北宁市| 石屏县| 天峨县| 辽阳市| 靖远县| 丁青县| 英德市| 余江县| 新竹市| 大姚县| 额济纳旗| 峨眉山市| 泽州县| 顺昌县| 定边县| 邵阳县| 寿阳县| 泰和县| 都匀市| 连江县| 会东县| 锡林浩特市| 永春县| 武汉市| 威信县| 久治县| 高清| 屏南县| 马尔康县| 垫江县| 华容县| 武功县| 子洲县| 阳山县| 克东县| 五常市| 陈巴尔虎旗|