background preloader

Malware Analysis

Facebook Twitter

Community Malicious code research and analysis. Malware Analysis Tutorials: a Reverse Engineering Approach. 5 Steps to Building a Malware Analysis Toolkit Using Free Tools by Lenny Zeltser. Examining the capabilities of malicious software allows your IT team to better assess the nature of a security incident, and may help prevent further infections.

5 Steps to Building a Malware Analysis Toolkit Using Free Tools by Lenny Zeltser

Here's how to set up a controlled malware analysis lab—for free. A large number of computer intrusions involve some form of malicious software (malware), which finds its way to the victim's workstation or to a server. When investigating the incident, the IT responder typically seeks to answer questions such as: What actions can the malware specimen perform on the system? How does it spread?