Digital Forensics: Malware Forensics and Reverse Engineering Foundations
Published:
Reviewed by Sourabh · 20 May 2026
Questions
30
Duration
30 min
Faculty-reviewed
0
Practice with national-level exam (FACT, FACT Plus, NET, CUET, etc.) mocks, learn from structured notes, and get your doubts solved in one place.
Published:
Reviewed by Sourabh · 20 May 2026
Questions
30
Duration
30 min
Faculty-reviewed
0
Updated
20 May 2026
FACT Digital Forensics paper drill on malware forensics from the analyst's bench, covering the classical taxonomy of viruses, worms, and Trojans, the ransomware family with its locker and crypto classes and the worm-style propagation behind WannaCry 2017 and NotPetya 2017 through the EternalBlue SMBv1 exploit, the spyware versus adware distinction, user-mode and kernel-mode rootkits and hardware keyloggers, fileless malware that lives in memory through PowerShell and WMI, static analysis of the Windows Portable Executable (PE) format with its DOS header, NT headers, and Import Address Table (IAT), the Linux Executable and Linkable Format (ELF) defined in the System V ABI, the strings utility for fast triage, YARA pattern matching, the Mandiant imphash, packer recognition through UPX section names and high entropy, dynamic analysis with the Cuckoo and CAPE sandboxes, Sysinternals Process Monitor on Windows, Wireshark for command-and-control traffic capture inside the sandbox, anti-VM checks through CPUID and MAC OUI inspection, reverse engineering with Ghidra (NSA, 2019) and x64dbg, the IoC taxonomy spanning hashes, IP addresses, domains, registry keys, and mutexes, OASIS STIX and TAXII for threat intelligence sharing, David Bianco's Pyramid of Pain (2013), and the MITRE ATT&CK tactics and techniques matrix.
For FACT aspirants and MSc digital forensics students working through malware analysis and incident response modules, and useful as a revision pass before NFSU MSc, GREM, GCFA, and CHFI exams. Questions emphasise definitions, tooling, and the registry and file system artefacts an incident responder hunts for, with explicit references to NIST SP 800-83, NIST SP 800-86, and the standard textbooks by Sikorski and Honig, Ligh and colleagues, and Casey.
Topics covered:
Useful for revision and self-testing before the FACT Digital Forensics paper.
Allow 30 minutes.
Questions are written and edited by the ForensicSpot team and cited from peer-reviewed forensic textbooks, official syllabi and primary case law. Each one is verified before publishing. Detailed explanations show after you submit, so the test stays a real test. See a mistake? Tell us.