- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 222字
- 2021-06-24 12:29:04
How it works...
We began in step 1 by importing the pefile library and specifying which file we will be analyzing. In this case, the file was python-3.7.2-amd64.exe, though it is just as easy to analyze any other PE file. We then continued on to examine the DLLs being imported by the file, in order to understand which methods the file may be using in Step 2. DLLs answer this question because a DLL is a library of code that other applications may call upon. For example, USER32.dll is a library that contains Windows USER, a component of the Microsoft Windows operating system that provides core functionality for building user interfaces. The component allows other applications to leverage the functionality for window management, message passing, input processing, and standard controls. Logically then, if we see that a file is importing a method such as GetCursorPos, then it is likely to be looking to determine the position of the cursor. Continuing in step 3, we printed out the sections of the PE file. These provide a logical and physical separation to the different parts of a program, and therefore offer the analyst valuable information about the program. Finally, we printed out all of the parsed PE header information from the file in preparation for later utilizing it for feature engineering (Step 4).
- 現(xiàn)代測(cè)控系統(tǒng)典型應(yīng)用實(shí)例
- Visualforce Development Cookbook(Second Edition)
- 一本書玩轉(zhuǎn)數(shù)據(jù)分析(雙色圖解版)
- 數(shù)據(jù)挖掘?qū)嵱冒咐治?/a>
- Mastering ServiceNow Scripting
- Linux嵌入式系統(tǒng)開發(fā)
- Linux系統(tǒng)管理員工具集
- Hands-On Business Intelligence with Qlik Sense
- 企業(yè)級(jí)Web開發(fā)實(shí)戰(zhàn)
- Serverless Design Patterns and Best Practices
- Embedded Linux Development using Yocto Projects(Second Edition)
- Oracle 11g基礎(chǔ)與提高
- Mastering SQL Server 2014 Data Mining
- 探索中國(guó)物聯(lián)網(wǎng)之路
- 多傳感器數(shù)據(jù)智能融合理論與應(yīng)用