[SSI] Practical Malware Analysis - Notes
Chapitre 1
- Strings : http://bit.ly/ic4plL
- Packed Exe
- Gestion des dépendances
- Dependency Walker : http://www.dependencywalker.com/
- Ressource Hacker : http://www.angusj.com/resourcehacker/
Chapitre 3
- GFI SandBox : http://www.threattracksecurity.com/enterprise-security/malware-analysis-sandbox-tools.aspx
- RegShot : https://sourceforge.net/projects/regshot/
- ApateDNS : https://www.fireeye.com/services/freeware/mandiant-apatedns.html
- NetCat : http://nc110.sourceforge.net/
nc -l -p 80 - Wireshark : https://www.wireshark.org/ — follow tcp stream
- INetSim (Linux) Simulation d’nternet : http://www.inetsim.org/
Programmation bas niveau Windows
http://undocumented.ntinternals.net/
Accueil > Notes Techniques > Sécurité Informatique > [SSI] Practical Malware Analysis - Notes