Difference between revisions of "Unprotect Project2"

From Unprotect Project
Jump to: navigation, search
Line 8: Line 8:
 
Lot of technic are use by malware coder to defeat the analyst and the tools that allow the detection.
 
Lot of technic are use by malware coder to defeat the analyst and the tools that allow the detection.
  
It’s important to highlight this technics because they are also used by legitimate program to avoid reverse engineering and analysis and to protect intellectual property.
+
It is important to highlight this technics because they are also used by legitimate program to avoid reverse engineering and analysis and to protect intellectual property.
 +
 
 +
The objective of this wiki is to centralise every technics to understand and detect new generation of malware.
  
  

Revision as of 22:30, 18 October 2016

Introduction

Welcome on The Unprotect Project
Most of the malware in the wild use protection to avoid analysis and detection. We often find obfuscation technics but also the use of packer/crypter, anti-debug, anti-disassembly or anti-sandbox, anti-honeypot, anti-dump, Anti-monitor, etc… Lot of technic are use by malware coder to defeat the analyst and the tools that allow the detection.

It is important to highlight this technics because they are also used by legitimate program to avoid reverse engineering and analysis and to protect intellectual property.

The objective of this wiki is to centralise every technics to understand and detect new generation of malware.


Getting started