Jump to content

Spyware Mods/Analysts


Stryker

Recommended Posts

This is just a question but how do the people like __RiP_ChAiN_ , TwistedMetal, rridgely etc know what it is to look for when someone posts a Hijack This log for analysis.

 

I have sat looking through many posts trying to identify patterns, however the logs don't really mean terribly much to me at a glance. It's an area that has interested me for a little while, but I'm not quite sure how to go about acquiring the necessary knowledge!

 

Have you had an interest/been involved in this area for so long that you recognise patterns, or does your knowledge come from attending a College or University?

 

Any tips or directions to learning materials would be great!

 

Cheers

 

Stryker

Sucess is a journey, not a destination...

Link to comment
Share on other sites

Any tips or directions to learning materials would be great!

 

Cheers

 

Stryker

Hi Stryker,

If you haven't already heard from him,just PM RipChain with a link to your post.He is so busy he may not see it in the Lounge.

:) davey

Link to comment
Share on other sites

 

HijackThis Tutorial & Guide

A guide and tutorial on using HijackThis to remove Browser Hijackers & Spyware

 

 

http://www.bleepingcomputer.com/tutorials/tutorial42.html

 

It does not explain what is good nor bad but using the two tutorials and Google searches you will soon find out how to read the HijackThis logs.

"Education is what remains after one has forgotten everything he learned in school." - Albert Einstein

IE7Pro user

Link to comment
Share on other sites

Sorry for being late to this thread, I rarely deviate from the HijackThis forums..

 

I have sat looking through many posts trying to identify patterns, however the logs don't really mean terribly much to me at a glance. It's an area that has interested me for a little while, but I'm not quite sure how to go about acquiring the necessary knowledge!

 

Have you had an interest/been involved in this area for so long that you recognise patterns, or does your knowledge come from attending a College or University?

Although it is possible to learn how HijackThis works in detail by reading tutorials on the subject, including the one available from Bleeping Computer, you will still need to go through some sort of training in order to recognize the infections in such logs. I, myself, went through the training course available on GeeksToGo, which is now one of the places I help teach how to work HIjackThis logs at. For more information on training there, you can take a look here.

 

There are also other schools that will teach you about HijackThis, such as CastleCops, MRU, and Bleeping Computer.

It is really interesting to get such a unique perspective on the way malware infects computers, and the ways used to get rid of such crap.

In addition, the reason people like me just seem to show up from nowhere, is because most of us regularly do work at half a dozen forums, or more. Usually at one of the main fourms, where you can also learn how to read HJT logs from.

unite.jpg
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.