Hi, I'd like to get some samples and analyze them. (You can compress them and use a password, then upload them to rapidshare)
On Thu, Sep 10, 2009 at 3:14 PM, <[email protected]> wrote: > Hello All > > I recently came across several infected machine on one of a network I > support. This got me thinking instead of always cleaning the machine and > moving on I would like to start understanding the various downloaded binary > that aided in the infection. > > Can someone recommend a good source or briefly explain how you would start > such an analysis. > > So far I tried PEid but it was unable to identify the packer used, next I > used strings and piped the output to a text file, I can post the out if > anyone is interested. > > Thank You. > Sent from my Verizon Wireless BlackBerry > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > -- Best Regards, ---------------------------------------------------------- http://extremesecurity.blogspot.com http://www.linkedin.com/in/aalqarta http://www.experts-exchange.com/M_3011930.html
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
