In this chapter, we covered the most common examples of languages used nowadays. But what if you encounter something more exotic that you don't have a ready step-by-step tutorial for? Or what if a new script language becomes increasingly popular, is available on lots of systems, and is, therefore, misused by malicious actors? Don't panic—we have summarized the ideas that will help you successfully analyze any new threat.
Other script languages
Where to start from
Here is what you should do when analyzing a new threat:
- Identify the language. There are multiple ways to do this, as follows:
- Look at the file extensions used
- Use the file tool
- Search for the header signature online
- Check strings as they may give additional...