官术网_书友最值得收藏!

Autoruns

The startup list we saw earlier in this chapter, covers registry entries, schedule jobs, and file location. The bottom line is that this tool covers all of those, including other areas we have not discussed, such as Microsoft Office add-ons, codecs, and printer monitors, as can be seen in the following screenshot:

There are 32- and 64-bit versions of the autoruns tool. The screenshot above shows all possible triggers for an executable which was based on the research of the SysInternals' authors Mark Russinovich and Bryce Cogswell. The screenshot also categorizes each autorun entry, shows the description of each entry, and indicates the file path related to the entry.

As for reverse engineers, the identification of suspected files can be determined by having knowledge of what files are common to the startup prior to the system getting compromised. Continuous practice and experience will make the reverse engineer easily identify which are good or suspected executable files.

主站蜘蛛池模板: 娱乐| 闽侯县| 东光县| 翼城县| 永昌县| 深圳市| 博湖县| 微博| 龙胜| 绍兴市| 简阳市| 台山市| 乳山市| 鸡西市| 宁陵县| 曲水县| 镇沅| 岳普湖县| 新晃| 沐川县| 蒙城县| 宁都县| 鄂伦春自治旗| 怀柔区| 玛沁县| 化德县| 武定县| 察雅县| 宜良县| 上虞市| 谷城县| 万盛区| 白朗县| 彩票| 井冈山市| 曲阜市| 固原市| 皋兰县| 壶关县| 龙口市| 宁阳县|