Chapter 15
Types of Attacks and Malicious Software
Lab Exercises
15.01 Strings
15.02 UPX
15.03 PEview and Resource Hacker
15.04 VirusTotal
15.05 Regshot
15.06 Process Monitor
15.07 ApateDNS
Lab Analysis
Key Term Quiz
Your network has been attacked! Adversaries have injected malware onto your systems. Whether it was due to a user clicking a phishing link or by some other means, you’ve got your work cut out for you. It’s time for malware analysis, also known as malware reverse engineering. You must find information that will help you respond to a network intrusion. How did the malware get into your network? Which machines were infected? Which files were infected on those machines? What exactly does the malware do? Where does its ...
Get Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.