Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Entry point analysis
Oct 28 2005 11:28AM
keydet89 yahoo com
Is anyone pursuing entry point analysis of PE files, particularly files that have been obfuscated/compressed/encrypted?
Does anyone have links to publicly available information on this topic?
"Windows Forensics and Incident Recovery"
[ more ]
Copyright 2010, SecurityFocus