Update re102_section4.md

This commit is contained in:
SECURED.ORG
2017-08-10 22:50:57 -07:00
committed by GitHub
parent 2453e1959d
commit 97b2164241

View File

@@ -60,7 +60,7 @@ Cryptographic algorithms are often grouped into two major categories: symmetric
![alt text](https://securedorg.github.io/RE102/images/Section4_cipher.png "Section4_cipher") ![alt text](https://securedorg.github.io/RE102/images/Section4_cipher.png "Section4_cipher")
For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now lets look at sub_45B5AC. For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now lets look at `sub_45B5AC`.
![alt text](https://securedorg.github.io/RE102/images/Section4_looping.png "Section4_looping") ![alt text](https://securedorg.github.io/RE102/images/Section4_looping.png "Section4_looping")
@@ -84,4 +84,4 @@ In the beginning of this section, it mentioned you need to be suspicious of NOP
The next subsection will go over identifying which cryptographic algorithm this malware is using. The next subsection will go over identifying which cryptographic algorithm this malware is using.
[Section 3.2 <- Back](https://securedorg.github.io/RE102/section3.2) | [Next -> Section 4.1](https://securedorg.github.io/RE102/section4.1) [Section 3.2 <- Back](https://securedorg.github.io/RE102/section3.2) | [Next -> Section 4.1](https://securedorg.github.io/RE102/section4.1)