- Joined
- 20.10.23
- Messages
- 122
- Reaction score
- 306
- Points
- 63
Malware Noob Month Post #1
Anti-malware vendors (anti-virus companies, but it's more appropriate to call them "anti-malware" now), rely heavily on known-good and known-bad lists.
In other words, anti-malware companies maintain a large list of file signatures which are safe and which are dangerous.
Every file an anti-malware company encounters is digitally "fingerprinted" using what is known as "file hashing". There are many different fingerprinting (or file hashing) techniques. Although, the most commonly used techniques used by anti-malware services are MD5, SHA-1, or SHA256 hashing.
When you first install an anti-malware product on your computer it walks each directory on your computer (it goes through your entire computer), and "fingerprints" everything.
It compares the fingerprint of each file against its "known-good" or "known-bad" list. If a known-good is encountered, it skips it. If it is a known-bad, it will take action based on what it believes the threat to be. If the file is unknown, other action may be taken based on the file characteristics (is it a .exe, a picture of a cat, etc).
Everyday anti-malware vendors update their "known-good" and "known-bad" lists. This is one of the easiest way for anti-malware vendors to combat malware.
The likelihood of 2 files having the same "fingerprint" (SHA256 hash) is 2^256
Or, to be specific, the chance of 2 files having the same fingerprint is 115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039,457,584,007,913,129,639,936
Hence, using this simple file fingerprinting identification system, anti-malware services can feel fairly confident their fingerprinting method works and is accurate
Now you're asking... is there a way for malware writers to avoid fingerprinting? To change their fingerprint? Of course! That's for tomorrows post
all other posts will be made under this thread. So stay tuned and keep watching the thread
Anti-malware vendors (anti-virus companies, but it's more appropriate to call them "anti-malware" now), rely heavily on known-good and known-bad lists.
In other words, anti-malware companies maintain a large list of file signatures which are safe and which are dangerous.
Every file an anti-malware company encounters is digitally "fingerprinted" using what is known as "file hashing". There are many different fingerprinting (or file hashing) techniques. Although, the most commonly used techniques used by anti-malware services are MD5, SHA-1, or SHA256 hashing.
When you first install an anti-malware product on your computer it walks each directory on your computer (it goes through your entire computer), and "fingerprints" everything.
It compares the fingerprint of each file against its "known-good" or "known-bad" list. If a known-good is encountered, it skips it. If it is a known-bad, it will take action based on what it believes the threat to be. If the file is unknown, other action may be taken based on the file characteristics (is it a .exe, a picture of a cat, etc).
Everyday anti-malware vendors update their "known-good" and "known-bad" lists. This is one of the easiest way for anti-malware vendors to combat malware.
The likelihood of 2 files having the same "fingerprint" (SHA256 hash) is 2^256
Or, to be specific, the chance of 2 files having the same fingerprint is 115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039,457,584,007,913,129,639,936
Hence, using this simple file fingerprinting identification system, anti-malware services can feel fairly confident their fingerprinting method works and is accurate
Now you're asking... is there a way for malware writers to avoid fingerprinting? To change their fingerprint? Of course! That's for tomorrows post
all other posts will be made under this thread. So stay tuned and keep watching the thread
