all InfoSec news
Dissecting Windows Malware Series – Creating Malware-Focused Network Signature – Part 5
Malware Analysis, News and Indicators - Latest topics malware.news
In the previous article https://8ksec.io/dissecting-windows-malware-series-risc-vs-cisc-architectures-part-4/, we took a little detour and learnt more about CPU architectures, in order to understand the underlying mechanisms assembly code analysis is build upon.
We mostly talked about:
The differences between CISC and RISC architectures.
Where are we heading in the future
How is it related to Malware Analysis
Without further a due, let’s start learning how create malware-focused network signatures.
Table of Contents
article components discover learn malware malware analysis manipulation network objectives opsec real sample series signature signatures windows windows malware