Malware Analysis Techniques by Dylan Barker

Malware Analysis Techniques by Dylan Barker

Author:Dylan Barker [Dylan Barker]
Language: eng
Format: epub
Publisher: Packt Publishing
Published: 2021-06-18T00:00:00+00:00


Regshot

While Regshot is quite an old tool at this point, it still functions very well and will provide a good basis for monitoring the filesystem and registry for changes that take place after malware is executed on the system.

The Regshot pane is shown in the following screenshot:

Figure 6.1 – The Regshot pane

As you can see, Regshot has a fairly simple user interface (UI), and the ability to recursively monitor directories and output to a text file once complete.

First, we'll select the ellipses next to the Output path: box, and select our desktop for ease of access after executing our malware.

The process is illustrated in the following screenshot:



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.