官术网_书友最值得收藏!

Summary

In the first chapter, we learned about reverse engineering and its importance when analyzing malware. To begin with our reverse engineering adventures, we have to learn the system we are analyzing. We discussed the three main areas in the Windows operating system environment: memory, disk, and the registry.  In this chapter, we aimed to find malware from a compromised Windows system by extracting suspected files. To do that, we listed common startup areas in the system that we can search into. These areas include the registry, task schedules, and startup folder.  

We learned that typical malware behaves by installing itself and runnng code that harms the system. Malware installs itself basically for persistence which results in the malware file triggering most of the time the system is online. We then listed a few behaviors as to why malware was called malicious. This malicious code consisted of anything to do with crime entailing monetary or political gain, such as ransom and backdoor access.

We ended this chapter by listing tools we can use to easily identify the suspected files. We first introduced pre-existing Windows tools such as the Registry editor, Task Manager and the Task Scheduler. We followed these with two more tools from SysInternals: autoruns and Process explorer.  With these tools at hand, we should be able to list down our suspected files. However, as with any other tasks, we will be able to master identification faster with practice and experience.

主站蜘蛛池模板: 繁峙县| 金平| 河东区| 苍南县| 嘉祥县| 睢宁县| 建阳市| 慈溪市| 乐平市| 大安市| 郯城县| 长泰县| 盐山县| 兴山县| 大丰市| 古交市| 吉林省| 斗六市| 罗江县| 铁岭市| 库尔勒市| 通州区| 绍兴县| 乐亭县| 西吉县| 张家港市| 仙游县| 马尔康县| 洛川县| 青田县| 合肥市| 松溪县| 济南市| 凤庆县| 吉木乃县| 东光县| 渑池县| 亚东县| 和静县| 长阳| 昂仁县|