Identify Rootkit and DLL Injection Activity

Students will use Olly Debugger and Process Hacker to debug a suspect program and determine if any of the observed behavior is malicious or not. This lab shows one possible way malicious software hooks into legitimate programs and will provide an "under the hood" perspective on how programs work in the Windows environment.

Overview

Students will use Olly Debugger and Process Hacker to debug a suspect program and determine if any of the observed behavior is malicious or not. This lab shows one possible way malicious software hooks into legitimate programs and will provide an "under the hood" perspective on how programs work in the Windows environment.

Learning Partner
CYBRScore
CYBRScore
Cybersecurity Technical Hands-on Labs