Chapter 6. Executable File Analysis
Solutions in this chapter:
Frequently Asked Questions
At times during an investigation you may come across a suspicious executable file on which you would like to perform some analysis to get an idea of what it does or what function it performs. Many times, an intruder may leave scripts or configuration files behind, and these files are generally text files that can be opened and viewed. In the case of scripts, some knowledge of programming may be necessary to fully understand the function of the file.
In Chapter 5
, we discussed file signature analysis, a method for determining whether a file has the correct file extension based on the ...