Identify Rootkit and DLL Injection Activity
Cyberscore

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cybersecurity professionals, students, career changers, and more, growing their careers on Cybrary.

Time
40 minutes
Difficulty
Intermediate

Students will use Olly Debugger to debug a suspect program and determine if any of the observed behavior is malicious or not. They will also use Process Hacker to confirm if a possible DLL injection was successful. This lab fosters an understanding of debuggers, shows one possible way malicious software hooks into legitimate programs and will provi...

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cybersecurity professionals, students, career changers, and more, growing their careers on Cybrary.

This Virtual Lab is part of a Career Path: Become a SOC Analyst - Level 2

Overview

Students will use Olly Debugger to debug a suspect program and determine if any of the observed behavior is malicious or not. They will also use Process Hacker to confirm if a possible DLL injection was successful. This lab fosters an understanding of debuggers, shows one possible way malicious software hooks into legitimate programs and will provide an "under the hood" perspective on how programs work in the Windows environment.

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.