Binding or Wrapping Malicious Code A legitimate need for some - TopicsExpress



          

Binding or Wrapping Malicious Code A legitimate need for some applications is to combine data and executable files into a single file that can be used during an installation sequence. Since a given program could have a number of data files, library files, and executables we don’t want to ask the user to work with each of them separately and follow elaborate instructions. A script can be included in the package to perform all of the steps. Creating a Trojan horse is simply using a tool that wraps or binds a number of files into a packfile to combine together legitimate and illicit server executables into a believable application. There are many tools that accomplish this task easily; elitewrap.exe is one example. Some illicit server tools have binders in them already, and attackers can create their Trojan all in one step.
Posted on: Mon, 11 Nov 2013 09:06:39 +0000

Trending Topics



ck Boutique Convention is Sunday May

Recently Viewed Topics




© 2015