Reversing Various File Types

So far, we have been dealing with binary executables. In this chapter, we will also look at other ways in which code can be executed. Visiting websites (HTML) and receiving emails (that have documents attached to them) are some of the mediums where malware can easily enter a target system.

In this chapter, we will learn about the following topics:

  • Debugging scripts in HTML
  • Understanding Macro in Office documents
  • Performing PDF analysis
  • SWF analysis
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.19.211.134