Behind the scenes we've developed 6 different cryptanalysis techniques for detecting embedded executables, we'll be testing all the methods to determine the most effective and efficient one(s). You may have noticed some clean samples taking a while to run, we've been sequentially exhaustively searching with various techniques to locate embedded executables, a key indicator for a malicious document.
Overview of Content Published in December
-
Here is an overview of content I published in December: Blog posts: Update:
1768.py Version 0.0.22 Update: oledump.py Version 0.0.78 SANS ISC Diary
entries...
3 weeks ago
No comments:
Post a Comment