Just finished the Cookbook, outstanding piece of work, thank you to the authors. Unfortunately I’ve already forgotten chapter 1 so its back to the start!
One small request, not being the best C programmer in the world any chance that a copy of the unlinker.exe program referred to on page 607 and used in the video 17-10 could be put on the downloads page. It would be very useful for practicing hidden Service detection etc?
Sure, just give me a few days to dig it up. I have the source code, but lost the compiled exe, so I may need to create a new one.
Thats great news. I apologize for giving you something to do when I’m sure you are busy enough!
Feel free to drop me a direct email when you find it.
Thanks in advance
Here you go: http://code.google.com/p/malwarecookbook/source/detail?r=105
I wanted to apologize for not noticing that you had posted the tool I had requested. It popped back to mind today and visited this page and there it was from last September. Thank you very much for taking the time out.
I’ll have a play and get back to you.
Zip password: waprEq4femab
Hi Michael, how are you?
I’ve been doing a bunch of work on the publically available Stuxnet RAM Dump with Volatility etc, do you know of a Flame RAM dump kicking around anywhere?
Your email address will not be published. Required fields are marked *
You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>