Analysing hostile code

Assignment Help Management Information Sys
Reference no: EM1326058

Computer Forensics - Analysing hostile code

In this week, you need to analyze software. In your forensics practice, you often need to analyze hostile codes. In order to be safe, we do not recommend you take the risk of analyzing a real hostile code. However, if you could set up a secure environment and you decide to get some real experience on analyzing a real hostile code, you can do so. You need to select the software (e.g., WinWord, notepad, etc.) to investigate as soon as possible. Then you may use software such as pslist, PMDump, handle or Holodeck to find out what kind of external resources it is using. To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.

Some Hints:
For Linux systems, the following is a list of commands that you may use to analyze binaries:
md5sum, file, strings (e.g., strings -a xxx|more), hexdump (e.g, hexdump -C -v xxx|more), nm, ldd, readelf, objdump, strace (e.g., strace -o strace.txt -x -e write=all -ff ./xxx), gdb,

For windows, you may use systeminternals.com tools and also the following commands:
edit, cl, type, and cygwin based linux commands as above.

Reference no: EM1326058

Questions Cloud

Explaining the contracts : Is this contract legal and enforceable? Why or why not? If the agreement is not enforceable, how might Jan and Amy restructure it to increase its chances of being legal? Discussion on the legality of contracts
Thadvantages and disadvantages of using pass by reference : Discuss the pros and cons of static and dynamic allocation of memory in embedded applications. Be certain to address the circumstances under which there might be potential problems.
Important task about conflict of interest : Explain the kinds of conflicts of interest and how these problems may have devastating consequences. Explain why integrity is important to maintain regardless of the field/business.
Describe what degree of concentration it exhibits : Describe what degree of concentration it exhibits. Would it be considered an oligopoly.
Analysing hostile code : Computer Forensics - Analysing hostile code - To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.
Business ethics-corporate responsiblity : How would you balance your decision making between social ethics and responsibility to your employer? Explain
Legally enforceable contract : Do they have a binding contract? Must Jack buy the car from Rudy, even though it doesn't have an engine? What factors determine if a contract exists and if it is legally enforceable on both parties?
Business person influencing business in future : Please identify a business person (profit or non-profit) who you admire and articulate: How this person may influence you for your future in business.
Describe the idea of trade offs cost also benefit analysis : Describe the idea of trade offs cost also benefit analysis when answering the above question.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Explain the changing information systems

Changes in accountiung due to changing information systems - What are some ways that financial information will be changed in the way the information is processed,

  What ethical issues can arise in electronic auctions

Electronic Auctions -  - What controls should be placed on the products sold in electronic auctions? Provide at least 3 examples and What ethical issues can arise in electronic auctions?

  Explain discusses email volume

Email Volume Discussion - Explain discusses email volume, the best ways to handle email, and related topics based on the question provided. The solution includes a thorough discussion.

  Explain how technology is changing the competitive business

Business and Technology - Explain how technology is changing the competitive business landscape. In your answer, include example(s) of how technology has impacted specific businesses or industries.

  Information security is an expensive and difficult

Draw the line on what is sufficient and what steps do you take to determine where that line is? Explain

  Show the security for the payroll department

Moving From a 10BaseT to a 100BaseT Network - How would you provide the best desktop connectivity for end users, and the fastest possible throughput and security for the payroll department?

  Information politics

Information Politics - Do you have experiences that you can describe about user support (as a user or as an IT person)? why were they good or bad? what suggestions do you have?

  Information mobilization and deployment

Information networks as "enterprise glue": information mobilization and deployment - To what degree should organizations depend on the analysis of large databases and other IT resources to formulate basic strategy?

  The importance of organizational testing methodologies

The Importance of Organizational Testing Methodologies - This solution describes the importance of testing in organizations.

  Explain the problems or pitfalls

Problems or pitfalls of doing data planning and modeling - Explain the problems or pitfalls of doing data planning and modeling

  How is business value and it success interrelated

What is business value and How is business value and IT success interrelated?

  Describe portable input devices

Portable Input Devices - Describe different types, advantages, and disadvantages of portable input devices. Be sure to include the following information

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd