Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Managing PE Files With Overlays, (Mon, Sep 16th)

published on 2024-09-16 05:31:25 UTC by
Content:
There is a common technique used by attackers: They append some data at the end of files (this is called an overlay). This can be used for two main reasons: To hide the appended data from the operating system (steganography). By example, you can append a text file at the end of a JPEG image. When your favourite image viewer will process the picture, it will just ignore the "rogue" data. Here is a PNG picture that has a text file (dir output) added at the end:
Article: Managing PE Files With Overlays, (Mon, Sep 16th) - published 4 days ago.

https://isc.sans.edu/diary/rss/31268   
Published: 2024 09 16 05:31:25
Received: 2024 09 16 06:52:38
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Views: 0

Custom HTML Block

Click to Open Code Editor