- Mastering Reverse Engineering
- Reginald Wong
- 242字
- 2021-06-10 19:40:26
Media storage
Network administrators are very restrictive when it comes to using thumb drives. The primary reason is that external storage devices, such as USB thumb drives, CDs, DVDs, external hard drives, and even smartphones are all media in which malware can store itself. Once a storage device gets mounted to a computer, it serves like a regular drive. Malware can simply drop copies of itself to these storage drives. Similar to network worms, these are worms that depend on the user to run the malware. But with the Windows Autorun feature turned on, malware may execute once the drive is mounted, as can be seen in the following screenshot:

The previous image is the default dialog encountered when inserting a CD drive containing setup software.
The autorun.inf file in the root of a drive contains information on which file to automatically execute. This is used by software installers stored in CDs so that, when the disk is inserted, it automatically runs the setup program. This is abused by malware by doing these steps:
- Dropping a copy of its malware file in removable drives
- Along with its dropped copy, it generates an autorun.inf file that points to the dropped executable file, as can be seen in the following example:

The autorun.inf for the VirtualBox setup autoplay dialog shown previously contains the text as shown in the previous screenshot. The open property contains the executable to be run.
- Android應用安全實戰:Frida協議分析
- Metasploit Penetration Testing Cookbook(Second Edition)
- Kali Linux CTF Blueprints
- 白帽子講Web安全(紀念版)
- INSTANT Burp Suite Starter
- 計算機病毒分析與防范大全(第3版)
- Penetration Testing with Perl
- 黑客攻防與無線安全從新手到高手(超值版)
- 黑客攻防從入門到精通
- 交換機·路由器·防火墻(第2版)
- Web代碼安全漏洞深度剖析
- 黑客攻防從入門到精通:絕招版(第2版)
- 2010年中國互聯網網絡安全報告
- Developing Applications with Salesforce Chatter
- 復雜網絡環境下訪問控制技術