01.05.2013 Views

Visual Malware Reversing - Offensive Computing

Visual Malware Reversing - Offensive Computing

Visual Malware Reversing - Offensive Computing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Import Repair Process<br />

• New Method – Use kernel memory management<br />

data structure<br />

• Virtual Address Descriptor – VAD<br />

– Each process has a VAD to describe memory usage<br />

– OS uses VADs to interact with CPU MMU<br />

– Very accurate use of process space<br />

• Data Structure - Balanced Binary Tree<br />

– Address space<br />

– Size of memory region<br />

– Execution flags<br />

– Module memory mapping<br />

This is all the information<br />

needed to rebuild imports

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!