Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

Malware by Mind Map: Malware
5.0 stars - 4 reviews range from 0 to 5

Malware

Spreading mechanism

sequentiell

random

hitlist

Debugging

Breakpoints

Stack

Registers

Rootkits

stealth

a rootkit is a set of programs and code that allows a permanent or consistent, undetectable presence on a computer

2 primary functions

rootkits usually use deifferent modification methods

Vulnerability Classes

Buffer Overflows

Integer Overflows

Type Conversion Errors

Format String Attacks

Exploit Counter Measures

detect memory corruption

stop common exploitation patterns

Anti-Reversing Methods

virtual machine detection

debugger detection

anti-debugger code

software breakpoint detection

hardware breakpoint detection

anti-disassembler tricks

eliminating symbolic information

obfuscation

packing/encrypting code

Malware Analysis

automated malware must be analyzed in an automated fashion to keep up

3 criteria

relevant system behaviour

2 approaches

hashing of binaries can be used for unique sample identification

using virtual environment

same procedure applied to original process must be applied to all subsequently started processes