Reverse Engineering Hostile Code
                                   Reverse Engineering Hostile Code     Computer criminals are always ready and waiting to compromise a  weakness in a system. When they do, they usually leave programs on the system to  maintain their control. We refer to these programs as "Trojans" after the story  of the ancient Greek Trojan horse. Often these programs are custom compiled and  not widely distributed. Because of this, anti-virus software will not often  detect their presence. It also means information about what any particular  custom Trojan does is also not generally available, so a custom analysis of the  code is necessary to determine the extent of the threat and to pinpoint the  origin of the attack if possible. This article outlines the process of reverse engineering hostile  code. By "hostile code", we mean any process running on a system that is not  authorized by the system administrator, s...