- Mastering Reverse Engineering
- Reginald Wong
- 248字
- 2021-06-10 19:40:27
Tools
Identifying the registry entry, files dropped, and running processes that are related to the malware requires tools. There are existing tools that we can use to extract these objects. There are two analysis events we should consider: analysis after the malware has been executed and analysis before the malware executes. Since our aim for this chapter is to extract components, we will discuss the tools that can help us find suspected files. Analysis tools that are used after we have extracted our suspected malware will be discussed in further chapters.
When a system has already been compromised, the analyst would need to use tools that can identify suspected files. Each suspected file will be analysed further. To start off, we can identify it based on persistence.
- List down all processes and their respective file information
- From the list of known registry persistence paths, look for entries containing the file paths
- Extract the suspected files
The above steps may require pre-existing tools from Microsoft Windows, such as:
- The Registry Editor (regedit/regedt32) to search the registry
- You can also use the command line for accessing the registry reg.exe, as seen in the following screenshot:
- Task manager (taskmgr) to list down the processes
- Windows Explorer (explorer) or Command prompt (cmd) to traverse directories and retrieve the files.
However, there are also third-party tools that we can use that can help us list down suspected files. Here are a few we will briefly discuss:
- Autoruns
- Process explorer
- DevSecOps敏捷安全
- Metasploit Penetration Testing Cookbook(Second Edition)
- INSTANT Burp Suite Starter
- .NET安全攻防指南(上冊)
- 數據安全實踐指南
- 網絡安全技術及應用(第3版)
- 網絡安全技術與實訓(第4版)(微課版)
- Testing and Securing Android Studio Applications
- 網絡安全與攻防入門很輕松(實戰超值版)
- 網絡安全設計、配置與管理大全
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Mastering Python for Networking and Security
- 功能型密碼算法設計與分析