This is a walkthrough of the Lab 3-1 from the book Practical Malware Analysis. The sample under analysis, Lab03-01.exe
, performs some obscure network activity.
Read more...
This is a walkthrough of the Lab 1-4 from the book Practical Malware Analysis. The sample under analysis, Lab01-04.exe
, contains an embedded executable that will also need to be analyzed.
Read more...
This is a walkthrough of the Lab 1-3 from the book Practical Malware Analysis. The sample under analysis, Lab01-03.exe
, has been packed in such a way that it cannot be easily unpacked just with basic static analysis techniques.
Read more...
This is a walkthrough of the Lab 1-2 from the book Practical Malware Analysis. The sample under analysis, Lab01-02.exe
, has been packed so we will need to unpack it before performing static analysis.
Read more...
This is a walkthrough of the Lab 1-1 from the book Practical Malware Analysis: basic static malware analysis techniques are applied to the samples Lab01-01.exe
and Lab01-01.dll
.
Read more...
This article describes the steps for a basic static analysis of malware. [STILL DRAFT] Read more...
This guide covers the automation aspects of software updates on Linux Debian by addressing the following two needs: