2. Malware Encryption

Malware authors often use simple encoding techniques, because it is just enough to obscure the data, but sometimes, attackers also use encryption. To identify the use of cryptographic functionality in the binary, you can look for cryptographic indicators (signatures) such as:

  • Strings or imports that reference cryptographic functions
  • Cryptographic constants
  • Unique sequences of instructions used by cryptographic routines
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.233.43