官术网_书友最值得收藏!

How it works...

This scenario simulates tampering with a file and then utilizing similarity hashing to detect the existence of tampering, as well as measuring the size of the delta. We begin with a vanilla Python executable and then tamper with it by adding a null byte at the end (step 1). In real life, a hacker may take a legitimate program and insert malicious code into the sample. We double-checked that the tempering was successful and examined its nature using a hexdump in step 2. We then ran a similarity computation using similarity hashing on the original and tempered file, to observe that a minor alteration took place (step 3). Utilizing only standard hashing, we would have no idea how the two files are related, other than to conclude that they are not the same file. Knowing how to compare files allows us to cluster malware and benign files in machine learning algorithms, as well as group them into families.

主站蜘蛛池模板: 和平区| 乌恰县| 玛纳斯县| 金乡县| 扎赉特旗| 讷河市| 东明县| 楚雄市| 北京市| 景宁| 五寨县| 抚顺县| 通化市| 红原县| 上虞市| 霞浦县| 温宿县| 浠水县| 南康市| 兰溪市| 蓝田县| 霸州市| 庄浪县| 新沂市| 光山县| 阿荣旗| 大厂| 沾化县| 衡阳市| 宿迁市| 青铜峡市| 高青县| 类乌齐县| 崇礼县| 双城市| 宝山区| 霸州市| 慈利县| 利辛县| 南岸区| 高州市|