| ||||||||||||
| |||||
This chapter discussed disassembling malware to discover its features and functionalities. Disassembling code requires learning assembly language, acquiring a good disassembler like IDA Pro, and learning malware techniques. The payoff is a complete understanding of what the malware or hacker was attempting to do.
This concludes Honeypots for Windows, which guided you on a journey where, for once, the good guys always win. Honeypots are our best shot for staying equal with the malicious hacker community, and perhaps even moving ahead. A honeypot is often the best computer security defense tool for the job. As an early warning system, it can alert you when all the other security defenses have failed. Becoming a honeypot administrator is joining a brotherhood of like-minded people who are doing something to improve the world.
Thanks for reading my book. Please feel free to send questions, comments, and your real-world experiences to me at roger@banneretcs.com.
| |||||