Those tools are powerfull (see my diary about many curl features) and, in my opinion, deserve to be kept under your hunting rules. If tools like bitsadmin.exe are well-known to be (ab)used by malware samples, today, less attention is given to command-llne browsers like curl.exe or wget.exe. Wait, you were not aware of this? Just open a cmd.exe and type ‘curl.exe’ on your Windows 10 host: For a few weeks, I’m searching for suspicious files that make use of a command line browser like curl.exe or wget.exe in Windows environment.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |