R
royrodgers
Hello. I am fairly ignorant to the nature of computer viruses and their
cousins, but I have taken up an interest in learning more. I just
recieved an email with a faked return address, bearing a zip file as an
attachment. Obviously somebody is up to no-good. It has made me curious
though.
It is my intention to examine this file. I am not aware that the action
of uncompressing a zip archive will enable any code execution. Is this
correct?
If the compressed file(s) contain any executable code then I will
decompile it and examine the binary. I am under the immpression that
the only types of files that can hurt you are:
1. executables (.exe, .com, etc...)
2. documents with embedded scripting (i.e. MS Office)
3. files of types 1 & 2, occluded by false or extra file name
extension.
Is that correct?
Thanks!
Eric
cousins, but I have taken up an interest in learning more. I just
recieved an email with a faked return address, bearing a zip file as an
attachment. Obviously somebody is up to no-good. It has made me curious
though.
It is my intention to examine this file. I am not aware that the action
of uncompressing a zip archive will enable any code execution. Is this
correct?
If the compressed file(s) contain any executable code then I will
decompile it and examine the binary. I am under the immpression that
the only types of files that can hurt you are:
1. executables (.exe, .com, etc...)
2. documents with embedded scripting (i.e. MS Office)
3. files of types 1 & 2, occluded by false or extra file name
extension.
Is that correct?
Thanks!
Eric