Identify Rootkit and DLL Injection Activity
Students will use Olly Debugger and Process Hacker to debug a suspect program and determine if any of the observed behavior is malicious or not. This lab shows one possible way malicious software hooks into legitimate programs and will provide an "under the hood" perspective on how programs work in the Windows environment.
Already have an account? Sign In »

Students will use Olly Debugger to debug a suspect program and determine if any of the observed behavior is malicious or not. They will also use Process Hacker to confirm if a possible DLL injection was successful. This lab fosters an understanding of debuggers, shows one possible way malicious software hooks into legitimate programs and will provide an "under the hood" perspective on how programs work in the Windows environment.
LEARN MORE. ACHIEVE MORE.
Deciphering the essentials to enter a new career is hard, so we did it for you!
Focus on building your skills and take this cyberscore in a guided Career Path.
See the full benefits of our immersive learning experience with interactive courses and guided career paths.