August 2019
Intermediate to advanced
342 pages
9h 35m
English
As we will see, PE executables have multiple sections included in the binary file image, and this characteristic can be exploited to hide malicious software.
In fact, each of the PE sections can be thought of as a folder, hosting various binary objects (ranging from graphics files to encrypted libraries), that gets executed and/or decrypted at runtime, potentially infecting other executables on the same machine or remote machines on the network.
For instance, a PE section may contain a .sys (malicious driver) file that is aimed at compromising the kernel, along with a startup file containing configuration parameters, or remote links the binary can connect to, in order to download other ...
Read now
Unlock full access