Harry has collected a suspicious executable file from an infected system and seeks to reverse its machine code to instructions written in assembly language. Which tool should he use for this purpose?
The correct answer is B. Ollydbg.
Ollydbg is a debugger that can disassemble executable files, translating machine code into assembly language, allowing Harry to reverse engineer the executable and understand its behavior.
Here's why the other options are not the best choices:
A. HashCalc is a tool for calculating hash values, not for reverse engineering or disassembling executables.
C. BinText is a tool for extracting text strings from binary files, but it's not a disassembler.
D. oledump is a tool for analyzing OLE (Object Linking and Embedding) files, not for disassembling executables.
Ollydbg is a popular choice for reverse engineering and debugging on Windows platforms.
OllyDbg is a 32-bit assembler level analyzing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. Once the suspected malware sample is loaded on OllyDbg, it will show assembler mnemonics, opcodes, and virtual addresses. Investigators can set breakpoints and run the code to see how the malware functions. It is also possible to modify the execution flow of a malware file with OllyDbg.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
aqeel1506
4 months agoElb
6 months ago