NORM 发表于 2025-3-26 22:10:03

Network Communicationf network-connected devices makes the attack surface even bigger and better for attackers to target. But infecting a victim with malware is only one-half of the work for most attackers. Once the victim is infected, the malware typically uses the same network for further communication.

体贴 发表于 2025-3-27 02:04:10

Windows Internalsr a malware analyst. In this chapter, we cover system directories, objects, handles, and mutexes, and important system processes that are (mis)used by malware. We also look at Win32 APIs and system DLLs, which are commonly used by malware to perform malicious activities.

Countermand 发表于 2025-3-27 05:16:37

http://reply.papertrans.cn/63/6221/622008/622008_33.png

不规则的跳动 发表于 2025-3-27 11:37:47

http://reply.papertrans.cn/63/6221/622008/622008_34.png

Paraplegia 发表于 2025-3-27 17:39:46

http://reply.papertrans.cn/63/6221/622008/622008_35.png

牙齿 发表于 2025-3-27 18:32:03

5楼

情感 发表于 2025-3-27 22:36:52

6楼

中国纪念碑 发表于 2025-3-28 04:12:12

6楼

muster 发表于 2025-3-28 09:51:38

6楼

Headstrong 发表于 2025-3-28 14:21:56

6楼
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Malware Analysis and Detection Engineering; A Comprehensive Appr Abhijit Mohanta,Anoop Saldanha Book 2020 Abhijit Mohanta, Anoop Saldanha 2