Книга: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Назад: Antivirus Scanning: A Useful First Step
Дальше: Finding Strings

, can calculate and display hashes for several files at a time.

Once you have a unique hash for a piece of malware, you can use it as follows:

  • Use the hash as a label.

  • Share that hash with other analysts to help them to identify malware.

  • Search for that hash online to see if the file has already been identified.

sss
sss

© RuTLib.com 2015-2018