Malware Part 6: Intro into ELF
Videos from Linux Forensics
-
Malware Part 5: using LDD -
You are watching this now -
Malware Part 7: More fun with Readelf -
Malware Part 8: Looking into Program Sections and Segments