๐ Unleashing YARA โ Part 2
๐ก Newskategorie: Reverse Engineering
๐ Quelle: countuponsecurity.com
In the first post of this series we uncovered YARA and demonstrated couple of use case that that can be used to justify the integration of this tool throughout the enterprise Incident Response life-cycle. In this post we will step through the requirements for the development of YARA rules specially crafted to match patterns in Windows portable executable “PE” files. Additionally, […] ...