Analysis of a Malware Specimen.
Read the following article published by the Infosec Institute: “Encrypted Code Reverse Engineering:
Bypassing Obfuscation.” INFOSEC Institute, May 5, 2014. (Online:
Answer the following questions in relation to the article and apply the lessons learned from this week and last
1. How can reverse engineering and cracking assist the forensic investigator?
2. Through software functionality analysis, how do the authors finally defeat the obfuscation techniques?
3. What are the legal impacts, if any, that will impact a forensic investigator using these techniques?
The post Analysis of a Malware Specimen first appeared on COMPLIANT PAPERS.