Difference between pages "Tools:Vision" and "Malware analysis"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (New page: To make automated forensic tools, we are going to increasingly need to incorporate computer vision tools into our software. This page is a placeholder for information about open source and...)
 
(See Also)
 
Line 1: Line 1:
To make automated forensic tools, we are going to increasingly need to incorporate computer vision tools into our software. This page is a placeholder for information about open source and proprietary computer vision toolkits that would be useful in forensics.
+
Analyzing [[malware]], or malicious software, is more of an art than a technique. Because of the wide nature of these products, there are limitless ways to hide functionality.  
  
=Vision Toolkits=
+
Some common tools for malware analysis include simple programs like [[strings]]. More complex analysis can be conducted by looking at the headers of executables with programs like [[PEiD]] and [[PeExplorer]]. Finally, the most complete analysis can be done with debuggers like [[IDA Pro]] and [[OllyDbg]].
* [http://sourceforge.net/projects/opencvlibrary/ Intel Open Computer Vision Library (OpenCV)]
+
 
 +
== See Also ==
 +
* [[Malware]]
 +
* [[List of Malware Analysis Tools]]
 +
 
 +
== External Links ==
 +
* [http://nakedsecurity.sophos.com/2013/10/11/anatomy-of-an-exploit-ie-zero-day-part-1/ Anatomy of an exploit - inside the CVE-2013-3893 Internet Explorer zero-day - Part 1], by Paul Ducklin on October 11, 2013
 +
* [http://nakedsecurity.sophos.com/2013/10/25/anatomy-of-an-exploit-inside-the-cve-2013-3893-internet-explorer-zero-day-part-2/ Anatomy of an exploit - inside the CVE-2013-3893 Internet Explorer zero-day - Part 2], by Paul Ducklin on October 25, 2013
 +
 
 +
[[Category:Malware]]

Revision as of 01:33, 28 October 2013

Analyzing malware, or malicious software, is more of an art than a technique. Because of the wide nature of these products, there are limitless ways to hide functionality.

Some common tools for malware analysis include simple programs like strings. More complex analysis can be conducted by looking at the headers of executables with programs like PEiD and PeExplorer. Finally, the most complete analysis can be done with debuggers like IDA Pro and OllyDbg.

See Also

External Links