ELF Malware Analysis 101: Part 3 – Advanced Analysis

Getting Caught Up to Speed So far in this series we have profiled the ELF threat landscape and covered the most common intrusion vectors seen in Linux systems. We also pursued initial ELF analysis with an emphasis on static analysis. We learned about the different artifacts and components that are relevant for initial analysis and … Continue reading ELF Malware Analysis 101: Part 3 – Advanced Analysis