Hello All

I recently came across several infected machine on one of a network I support. 
This got me thinking instead of always cleaning the machine and moving on I 
would like to start understanding the various downloaded binary that aided in 
the infection.

Can someone recommend a good source or briefly explain how you would start such 
an analysis.

So far I tried PEid but it was unable to identify the packer used, next I used 
strings and piped the output to a text file, I can post the out if anyone is 
interested.

Thank You.
Sent from my Verizon Wireless BlackBerry
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to