Part Two in a multi-part series on holistic, multi-disciplinary analysis and reversing. The last post, “Mutex Analysis: The Canary in the Coal Mine,” started off showing to use mutexes to discover malware that is difficult to locate using more traditional methods and tools. We used a live compromised system for the example and the [...]
Trending Articles
More Pages to Explore .....