- Mastering Reverse Engineering
- Reginald Wong
- 157字
- 2021-06-10 19:40:28
Autoruns
The startup list we saw earlier in this chapter, covers registry entries, schedule jobs, and file location. The bottom line is that this tool covers all of those, including other areas we have not discussed, such as Microsoft Office add-ons, codecs, and printer monitors, as can be seen in the following screenshot:

There are 32- and 64-bit versions of the autoruns tool. The screenshot above shows all possible triggers for an executable which was based on the research of the SysInternals' authors Mark Russinovich and Bryce Cogswell. The screenshot also categorizes each autorun entry, shows the description of each entry, and indicates the file path related to the entry.
As for reverse engineers, the identification of suspected files can be determined by having knowledge of what files are common to the startup prior to the system getting compromised. Continuous practice and experience will make the reverse engineer easily identify which are good or suspected executable files.
- RESTful Java Web Services Security
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 信息系統安全檢測與風險評估
- INSTANT Burp Suite Starter
- 黑客攻防入門秘笈
- 網絡安全三十六計:人人該懂的防黑客技巧
- 可信計算3.0工程初步(第二版)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 信息安全導論(第2版)
- 先進云安全研究與實踐
- SQL Injection Strategies
- 實用黑客攻防技術
- 黑客攻防從入門到精通
- 復雜信息系統網絡安全體系建設指南
- 信息內容安全管理及應用