Managing PE Files With Overlays, (Mon, Sep 16th)

SANS Internet Storm Center, InfoCON: green 2024-09-16

Summary:

There is a common technique used by attackers: They append some data at the end of files (this is called an overlay). This can be used for two main reasons: To hide the appended data from the operating system (steganography). By example, you can append a text file at the end of a JPEG image. When your favourite image viewer will process the picture, it will just ignore the "rogue" data. Here is a PNG picture that has a text file (dir output) added at the end:

Link:

https://isc.sans.edu/diary/rss/31268

From feeds:

Intel Hub ยป T01 - SANS Internet Storm Center, InfoCON: green

Tags:

Date tagged:

09/16/2024, 03:38

Date published:

09/16/2024, 01:31