- Mastering Reverse Engineering
- Reginald Wong
- 157字
- 2021-06-10 19:40:28
Autoruns
The startup list we saw earlier in this chapter, covers registry entries, schedule jobs, and file location. The bottom line is that this tool covers all of those, including other areas we have not discussed, such as Microsoft Office add-ons, codecs, and printer monitors, as can be seen in the following screenshot:

There are 32- and 64-bit versions of the autoruns tool. The screenshot above shows all possible triggers for an executable which was based on the research of the SysInternals' authors Mark Russinovich and Bryce Cogswell. The screenshot also categorizes each autorun entry, shows the description of each entry, and indicates the file path related to the entry.
As for reverse engineers, the identification of suspected files can be determined by having knowledge of what files are common to the startup prior to the system getting compromised. Continuous practice and experience will make the reverse engineer easily identify which are good or suspected executable files.
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- Enterprise Cloud Security and Governance
- 計(jì)算機(jī)病毒原理與防范(第2版)
- 代碼審計(jì):企業(yè)級(jí)Web代碼安全架構(gòu)
- 防火墻技術(shù)與應(yīng)用(第2版)
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計(jì)技術(shù)揭秘
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)(第2版)
- 無(wú)線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- Securing Network Infrastructure
- 黑客攻防入門
- 網(wǎng)絡(luò)空間安全實(shí)踐能力分級(jí)培養(yǎng)(I)
- AI+網(wǎng)絡(luò)安全:智網(wǎng)融合空間體系建設(shè)指南