ATTENTION: The new home of the Digital Forensics Wiki is at Yeah, it's a silly name, but it was cheap.
This wiki will be going offline permanently in the near future. An exact date will be announced soon. Thank you for being a part of this community.
If you wish to work on the new forensicswiki, please join the Google Group forensicswiki-reborn

Difference between revisions of "Malware analysis"

From ForensicsWiki
Jump to: navigation, search
(See Also)
Line 4: Line 4:
== See Also ==
== See Also ==
* [[Malware]]
* [[List of Malware Analysis Tools]]
* [[List of Malware Analysis Tools]]

Revision as of 06:33, 28 October 2013

Analyzing malware, or malicious software, is more of an art than a technique. Because of the wide nature of these products, there are limitless ways to hide functionality.

Some common tools for malware analysis include simple programs like strings. More complex analysis can be conducted by looking at the headers of executables with programs like PEiD and PeExplorer. Finally, the most complete analysis can be done with debuggers like IDA Pro and OllyDbg.

See Also

External Links