Analysing hostile code

Assignment Help Management Information Sys
Reference no: EM1326058

Computer Forensics - Analysing hostile code

In this week, you need to analyze software. In your forensics practice, you often need to analyze hostile codes. In order to be safe, we do not recommend you take the risk of analyzing a real hostile code. However, if you could set up a secure environment and you decide to get some real experience on analyzing a real hostile code, you can do so. You need to select the software (e.g., WinWord, notepad, etc.) to investigate as soon as possible. Then you may use software such as pslist, PMDump, handle or Holodeck to find out what kind of external resources it is using. To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.

Some Hints:
For Linux systems, the following is a list of commands that you may use to analyze binaries:
md5sum, file, strings (e.g., strings -a xxx|more), hexdump (e.g, hexdump -C -v xxx|more), nm, ldd, readelf, objdump, strace (e.g., strace -o strace.txt -x -e write=all -ff ./xxx), gdb,

For windows, you may use systeminternals.com tools and also the following commands:
edit, cl, type, and cygwin based linux commands as above.

Reference no: EM1326058

Questions Cloud

Explaining the contracts : Is this contract legal and enforceable? Why or why not? If the agreement is not enforceable, how might Jan and Amy restructure it to increase its chances of being legal? Discussion on the legality of contracts
Thadvantages and disadvantages of using pass by reference : Discuss the pros and cons of static and dynamic allocation of memory in embedded applications. Be certain to address the circumstances under which there might be potential problems.
Important task about conflict of interest : Explain the kinds of conflicts of interest and how these problems may have devastating consequences. Explain why integrity is important to maintain regardless of the field/business.
Describe what degree of concentration it exhibits : Describe what degree of concentration it exhibits. Would it be considered an oligopoly.
Analysing hostile code : Computer Forensics - Analysing hostile code - To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.
Business ethics-corporate responsiblity : How would you balance your decision making between social ethics and responsibility to your employer? Explain
Legally enforceable contract : Do they have a binding contract? Must Jack buy the car from Rudy, even though it doesn't have an engine? What factors determine if a contract exists and if it is legally enforceable on both parties?
Business person influencing business in future : Please identify a business person (profit or non-profit) who you admire and articulate: How this person may influence you for your future in business.
Describe the idea of trade offs cost also benefit analysis : Describe the idea of trade offs cost also benefit analysis when answering the above question.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Management information systems written report

Management Information Systems Written Report - A problem-solving approach to case analysis will be introduced in class. For this approach, you will take a consultant role, and assume that you were hired by an organization

  Analyze employee and consumer privacy

Research Websites and other technologies that provide private information on U.S. citizens -Analyze employee and consumer privacy under the law and Use technology and information resources to research issues in law, ethics, and corporate governanc..

  Principles of good metrics program for it

Description of Information Systems - Provide a specific example of how a company illustrates the three key principles of good metrics program for IT.

  Explanation of the use of technologies

Explanation of the use of technologies - How have new technologies been helpful to you throughout your life?

  Use of the asp model in the business environment

Collaboration Software and the ASP Model - overview of the ASP model. In particular, this solution discusses the advantages and disadvantages on the adoption of the use of the ASP model in the business environment.

  Explain biometric vulnerabilities

Biometric Vulnerabilities - Discuss the given biometrics and the vulnerabilities

  Exponential price-performance improvements

Why have these two companies taken such diametrically opposite approaches? Why is Ebay in such a strong position? Digitalization of content

  How do companies use an rfp when sourcing software

What is included in a request for proposal (RFP)? How do companies use an RFP when sourcing software

  Information security is an expensive and difficult

Draw the line on what is sufficient and what steps do you take to determine where that line is? Explain

  Transaction processing information system

California city uses a police-beat allocation system; it is an example of what - group support system and transaction processing information system.

  Draw the physical data flow diagrams

Service Request SR-rm-004 - Draw the physical data flow diagrams. Use Microsfot Visio to prepare examples of flow charts and data flow diagrams.

  The use of a decision support system

The use of a decision support system - system in a business guarantee a better decision?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd