-
Show system files which were changed after installation. dpkg --verify Check various security related issues: checksecurity Tools
-
Memory analyzation softwrae to see physical memory as files in a virtual file system. GitHub — ufrisk/MemProcFS: MemProcFS
-
See also memory dump article. Usual stuff: Specialized software: Thinks to look out for:
-
See the Analysis data / forensic article for general data analysis. Also, relevant articles: Static analysis Notes beforehand: Have a first look into the file: xxd file.exe | less Have a look into the file segments binwalk file.exe Have a look in the strings strings file.exefloss file.exe You can try to visualize the entropy to maybe…
-
Tools: Execution possibilities for a dynamic analysis, if deobfuscation is not soooo good: Tipp: Overwrite sensible methods, if the language allows it. For example, in JavaScript: eval = print Now, each eval statement is not executed, but just printed :-).
-
Goal: See on a system if some specific executeable was executed.
-
Registry Windows Event Logging File system analysis See the NTFS article about logging.
-
Forensic tools