- Mastering Reverse Engineering
- Reginald Wong
- 152字
- 2021-06-10 19:40:28
The Process explorer
In essence, the Process explorer tool is similar to the Task Manager, as demonstrated in the following screenshot:

The advantage of this tool is that it can show more information about the process itself, such as how it was run, including the parameters used, and even its autostart location, as can be seen in the following example:

In addition, the process explorer has tools to send it VirusTotal identification, shows a list of strings identified from its image and the threads associated with it. From a reverser's point of view, the highly used information here is the command-line usage, and autostart location. VirusTotal is an online service that scans a submitted file or URL using multiple security software, as demonstrated in the following screenshot:
The results are not conclusive, but it gives the submitter an idea about the file's credibility of being legit software or malware.
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 白帽子講Web安全(紀念版)
- 黑客攻防入門秘笈
- 安全技術(shù)運營:方法與實踐
- 網(wǎng)絡(luò)空間安全實驗
- 計算機網(wǎng)絡(luò)安全技術(shù)研究
- Digital Forensics with Kali Linux
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- Instant Java Password and Authentication Security
- SQL Injection Strategies
- 信息技術(shù)基礎(chǔ):提高篇·實驗與習(xí)題
- Bug Bounty Hunting Essentials
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- 物聯(lián)網(wǎng)信息安全技術(shù)
- 聯(lián)邦學(xué)習(xí)原理與算法