Hi, I'd like to get some samples and analyze them. (You can compress them
and use a password, then upload them to rapidshare)

On Thu, Sep 10, 2009 at 3:14 PM, <[email protected]> wrote:

> Hello All
>
> I recently came across several infected machine on one of a network I
> support. This got me thinking instead of always cleaning the machine and
> moving on I would like to start understanding the various downloaded binary
> that aided in the infection.
>
> Can someone recommend a good source or briefly explain how you would start
> such an analysis.
>
> So far I tried PEid but it was unable to identify the packer used, next I
> used strings and piped the output to a text file, I can post the out if
> anyone is interested.
>
> Thank You.
> Sent from my Verizon Wireless BlackBerry
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>



-- 
Best Regards,

----------------------------------------------------------

http://extremesecurity.blogspot.com

http://www.linkedin.com/in/aalqarta

http://www.experts-exchange.com/M_3011930.html
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to