- Mastering Reverse Engineering
- Reginald Wong
- 152字
- 2021-06-10 19:40:28
The Process explorer
In essence, the Process explorer tool is similar to the Task Manager, as demonstrated in the following screenshot:

The advantage of this tool is that it can show more information about the process itself, such as how it was run, including the parameters used, and even its autostart location, as can be seen in the following example:

In addition, the process explorer has tools to send it VirusTotal identification, shows a list of strings identified from its image and the threads associated with it. From a reverser's point of view, the highly used information here is the command-line usage, and autostart location. VirusTotal is an online service that scans a submitted file or URL using multiple security software, as demonstrated in the following screenshot:
The results are not conclusive, but it gives the submitter an idea about the file's credibility of being legit software or malware.
- RESTful Java Web Services Security
- 數據恢復方法及案例分析
- INSTANT Burp Suite Starter
- Mastering Kali Linux for Advanced Penetration Testing
- 工業控制網絡安全技術
- 數字化轉型浪潮下的數據安全最佳實踐指南
- 數據安全與隱私計算(第3版)
- 計算機網絡安全技術研究
- 網絡安全設計、配置與管理大全
- Learning Pentesting for Android Devices
- 隱私計算:推進數據“可用不可見”的關鍵技術
- 網絡攻防實戰研究:MySQL數據庫安全
- Android Application Security Essentials
- Web安全攻防從入門到精通
- 隱私保護機器學習