- Mastering Reverse Engineering
- Reginald Wong
- 246字
- 2021-06-10 19:40:28
Summary
In the first chapter, we learned about reverse engineering and its importance when analyzing malware. To begin with our reverse engineering adventures, we have to learn the system we are analyzing. We discussed the three main areas in the Windows operating system environment: memory, disk, and the registry. In this chapter, we aimed to find malware from a compromised Windows system by extracting suspected files. To do that, we listed common startup areas in the system that we can search into. These areas include the registry, task schedules, and startup folder.
We learned that typical malware behaves by installing itself and runnng code that harms the system. Malware installs itself basically for persistence which results in the malware file triggering most of the time the system is online. We then listed a few behaviors as to why malware was called malicious. This malicious code consisted of anything to do with crime entailing monetary or political gain, such as ransom and backdoor access.
We ended this chapter by listing tools we can use to easily identify the suspected files. We first introduced pre-existing Windows tools such as the Registry editor, Task Manager and the Task Scheduler. We followed these with two more tools from SysInternals: autoruns and Process explorer. With these tools at hand, we should be able to list down our suspected files. However, as with any other tasks, we will be able to master identification faster with practice and experience.
- Extending Symfony2 Web Application Framework
- Kali Linux CTF Blueprints
- Metasploit Penetration Testing Cookbook(Third Edition)
- 白帽子講Web安全(紀(jì)念版)
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- Applied Network Security
- 網(wǎng)絡(luò)安全技術(shù)與實(shí)訓(xùn)(第4版)(微課版)
- 互聯(lián)網(wǎng)企業(yè)安全高級(jí)指南
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- CTF特訓(xùn)營:技術(shù)詳解、解題方法與競賽技巧
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測實(shí)施指南
- 動(dòng)態(tài)賦能網(wǎng)絡(luò)空間防御
- 黑客攻防從入門到精通:絕招版(第2版)
- 大數(shù)據(jù)時(shí)代的云安全
- 網(wǎng)絡(luò)安全攻防技術(shù)實(shí)戰(zhàn)