Announcement

Collapse
No announcement yet.

hexing.. identifying trojans..

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • hexing.. identifying trojans..

    Hey guys, I was curious to know which HEX editor by preference you prefer.

    Also, I am curious to know how to identify a trojan or malicious file using a HEX editor, things to look for, or is there anything that will simply give it "away" so to speak. I currently come from the "game hacking" scene I some knowledge of programming, and well I am more interested in learning about more higher level things and furthering my current knowledge to deeper depths.

    Just curious to know if you can simply identify a trojan with a hex edior and which by preference is the "better" or most user friendly hex editor to use.

    -regards

  • #2
    Originally posted by meistro
    I am curious to know how to identify a trojan or malicious file using a HEX editor, things to look for, or is there anything that will simply give it "away" so to speak.
    ...
    Just curious to know if you can simply identify a trojan with a hex edior...
    First, select the malware you want to identify. Historically, viruses have been identified based on "fingerprints" or sequences of instructions/byte code contained within predictable parts of files.
    Worms have been associated with certain connect strings, or network activity and service request.
    Trojans are more difficult to identify while they are not running. "Trojan-like" activity is sometimes considered.

    Using just a hex editor to identify malware? Not so easy. You may be able to search for specific strings, but forensic analysis and examination of potentially bad code often includes a "decompiler" and/or disassmbler to translate to mnemonics or asm-like code.

    Do you want to know something about how it is done? You write you are a programmer? There is an open soure project for detecting Viruses etc, which is called clamav. Being openSource, you can see what methds they uise in more detail than provided here.

    Many more techniques are used beyond the ones mentioned here. :-)

    Comment


    • #3
      for incoming (live on network) tcpDump or bpf. For existing virus on machines vi.
      "Never Underestimate the Power of Stupid People in Large Groups"

      Comment

      Working...
      X