- Mastering Reverse Engineering
- Reginald Wong
- 206字
- 2021-06-10 19:40:25
The Image File Execution Options key
File paths set in the debugger of the Image File Execution Options key is run when the process is to be debugged or is run with the CreateProcess API:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[Process Name]
- Debugger = [executable file]
- [Process Name] pertains to the filename of the running executable
- This persistence only triggers when there is a need for [Process Name] to invoke a debugger
Browser Helper Objects key
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\[CLSID]
- Having the CLSID as a subkey simply means that it is installed and enabled as an Internet Explorer BHO
- The CLSID is registered under the HKEY_CLASSES_ROOT\CLSID\[CLSID]\InprocServer32 key
- The (Default) value points to the DLL file associated with the BHO
- The DLL file is loaded every time Internet Explorer is opened
Besides registry entries, an executable can also be triggered by schedule using the task scheduler or cron jobs. An executable or a script can be triggered even at certain conditions. Take, for example, the following screenshot of a Windows Task scheduler:
There are many more ways in which malware gets persistence other than those which have been listed previously. These are the challenges that a reverse engineer learns as they encounter new techniques.
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- API攻防:Web API安全指南
- 硬黑客:智能硬件生死之戰(zhàn)
- Building a Home Security System with BeagleBone
- 數(shù)據(jù)安全領(lǐng)域指南
- 實用黑客攻防技術(shù)
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- Bug Bounty Hunting Essentials
- Mastering Malware Analysis
- 云計算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 黑客攻防與電腦安全從新手到高手(超值版)
- Practical Mobile Forensics
- 社會工程:防范釣魚欺詐(卷3)
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用