官术网_书友最值得收藏!

Identification and Extraction of Hidden Components

Today, the most common use for reverse engineering is in targeting malware. Like any other software, malware has its installation process. The difference is that it does not ask for the user's permission to install. Malware does not even install in the Program files folder where other legitimate applications are installed. Rather, it tends to install its malware file in folders that are not commonly entered by the user, making it hidden from being noticed. However, some malware shows up noticed and generates copies of itself in almost all noticeable folders such as the desktop. Its purpose is to get its copies executed by users, be it by accidental double-click or by curiosity. This is what we usually call malware persistence.

Persistence is when malware consistently runs in the background. In this chapter, we will be pointing out general techniques used by malware to become persistent. We will also explain common locations where malware files are stored. Major behaviors of malware and some tools that are capable of identifying how the malware installs itself in the system will also be shown.  Understanding how malware is delivered will definitely help a reverse engineer explain how the attacker was able to compromise the system.

In this chapter we will learn about the following:

  • The basics of the operating system environment
  • Typical malware behavior:
    • Malware delivery
    • Malware persistence
    • Malware payload
  • Tools used to identify hidden components
主站蜘蛛池模板: 驻马店市| 定南县| 沁阳市| 双流县| 三明市| 西和县| 闽清县| 东乌珠穆沁旗| 嵊州市| 罗平县| 建瓯市| 九台市| 凤庆县| 方山县| 襄汾县| 邓州市| 商洛市| 辉南县| 大安市| 海城市| 凤阳县| 山东省| 芒康县| 阜城县| 邢台县| 墨江| 岳西县| 漳平市| 彰武县| 沂南县| 开封市| 绥滨县| 肇源县| 扬中市| 东阳市| 子长县| 孝昌县| 扬州市| 三穗县| 福鼎市| 德清县|