- Mastering Reverse Engineering
- Reginald Wong
- 127字
- 2021-06-10 19:40:27
Payload – the evil within
The attacker develops malware for a purpose. This is typically to cause harm to the target, maybe because of hate, for fun, for monetary or, probably, political reasons. Here are some typical malware payloads that were seen in the wild:
- Encrypting files for ransom
- Deleting all files
- Formatting drives
- Gaining full access to the system and the network
- Stealing accounts and passwords
- Stealing documents, images, and videos
- Changing specific configuration and settings
- Turning the computer into a proxy server
- Installing cryptocoin miners
- Continuously opening websites - ad or porn sites
- Installing more malware
- Installing adware
One of the conclusions that a reverse engineer includes in the report is the payload. This determines what malware actually does to the machine other than getting installed.
推薦閱讀
- Web漏洞分析與防范實戰(zhàn):卷1
- 黑客攻防入門秘笈
- 工業(yè)物聯(lián)網(wǎng)安全
- 同態(tài)密碼學原理及算法
- Spring Security(Third Edition)
- Building a Home Security System with BeagleBone
- 從0到1:CTFer成長之路
- Web安全之深度學習實戰(zhàn)
- 網(wǎng)絡關鍵設備安全檢測實施指南
- 網(wǎng)絡攻防實戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- 聯(lián)邦學習原理與算法
- 黑客攻防與電腦安全從新手到高手(超值版)
- Python Penetration Testing Essentials
- 網(wǎng)絡安全滲透測試
- 信息安全風險評估手冊(第2版)