Chapter 15

Types of Attacks and Malicious Software

Lab Exercises

15.01   Strings

15.02   UPX

15.03   PEview and Resource Hacker

15.04   VirusTotal

15.05   Regshot

15.06   Process Monitor

15.07   ApateDNS

Lab Analysis

Key Term Quiz

Your network has been attacked! Adversaries have injected malware onto your systems. Whether it was due to a user clicking a phishing link or by some other means, you’ve got your work cut out for you. It’s time for malware analysis, also known as malware reverse engineering. You must find information that will help you respond to a network intrusion. How did the malware get into your network? Which machines were infected? Which files were infected on those machines? What exactly does the malware do? Where does its ...

Get Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.