Analysing hostile code

Assignment Help Management Information Sys
Reference no: EM1326058

Computer Forensics - Analysing hostile code

In this week, you need to analyze software. In your forensics practice, you often need to analyze hostile codes. In order to be safe, we do not recommend you take the risk of analyzing a real hostile code. However, if you could set up a secure environment and you decide to get some real experience on analyzing a real hostile code, you can do so. You need to select the software (e.g., WinWord, notepad, etc.) to investigate as soon as possible. Then you may use software such as pslist, PMDump, handle or Holodeck to find out what kind of external resources it is using. To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.

Some Hints:
For Linux systems, the following is a list of commands that you may use to analyze binaries:
md5sum, file, strings (e.g., strings -a xxx|more), hexdump (e.g, hexdump -C -v xxx|more), nm, ldd, readelf, objdump, strace (e.g., strace -o strace.txt -x -e write=all -ff ./xxx), gdb,

For windows, you may use systeminternals.com tools and also the following commands:
edit, cl, type, and cygwin based linux commands as above.

Reference no: EM1326058

Questions Cloud

Explaining the contracts : Is this contract legal and enforceable? Why or why not? If the agreement is not enforceable, how might Jan and Amy restructure it to increase its chances of being legal? Discussion on the legality of contracts
Thadvantages and disadvantages of using pass by reference : Discuss the pros and cons of static and dynamic allocation of memory in embedded applications. Be certain to address the circumstances under which there might be potential problems.
Important task about conflict of interest : Explain the kinds of conflicts of interest and how these problems may have devastating consequences. Explain why integrity is important to maintain regardless of the field/business.
Describe what degree of concentration it exhibits : Describe what degree of concentration it exhibits. Would it be considered an oligopoly.
Analysing hostile code : Computer Forensics - Analysing hostile code - To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.
Business ethics-corporate responsiblity : How would you balance your decision making between social ethics and responsibility to your employer? Explain
Legally enforceable contract : Do they have a binding contract? Must Jack buy the car from Rudy, even though it doesn't have an engine? What factors determine if a contract exists and if it is legally enforceable on both parties?
Business person influencing business in future : Please identify a business person (profit or non-profit) who you admire and articulate: How this person may influence you for your future in business.
Describe the idea of trade offs cost also benefit analysis : Describe the idea of trade offs cost also benefit analysis when answering the above question.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Trends of technology for dect cordless phones

Analysis of the trends of technology for DECT Cordless phones - An analysis of the trends of technology that could be used to communicate value

  Explain the role of the vendor

SDLC Methodology and Purchasing Life Cycle - Explain the role of the vendor for each of the three phases of the purchasing life cycle.

  Why impact extends beyond the technology lifespan

Why Impact Extends Beyond the Technology Lifespan - Impact on business after that time period?

  What role should the cio play in business change

CIO and Implementing Change - What role should the CIO play in business change

  Explain the basic make-up for a computer

Computer and Functions - List and explain the basic make-up for a computer and the function each performs. Identify and describe the two types of software.

  Explain the changing information systems

Changes in accountiung due to changing information systems - What are some ways that financial information will be changed in the way the information is processed,

  Disaster recovery and contingency plan

Disaster recovery/contingency plan - Create a paper to deliver your findings to the CEO.

  Responsibility of managers to implement sudden

Global Issues on technology - Responsibility of managers to implement sudden, drastic organizational changes within their scope of responsibility.

  Provide a comprehensive discussion on texting

Internet: Connectivity and Immediacy - It provides a comprehensive discussion on texting, tweeting, and the role of social media.

  Conduct an internet search looking for tips

Conduct an Internet search looking for tips for Microsoft Office 2010 (e.g., tutorials, tips, etc.). Which search engine did you use, and why and What specific search terms did you use?

  Discuss how the data is used by each of these organizations

Check the data that is captured about you as a student, a professional, and a customer at a local grocery store

  Do you think this is a valid perception

Prototypes are sometimes used in the development process and some end up as the actual solutions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd