We would like to show a dialog similar to this one when inspecting ELF binaries: There is also an additional issue with Process Hacker since we also allow users to inspect PE header information via a separate dialog and are unable to show ELF64 header information for Linux binaries (since we're unable to query ImageName and pass that path into our peview utility). Anti-virus software vendors are also in the same situation and are unable to properly scan running Pico processes and they are additionally blocked or shown as malicious by nearly all 3rd party security tools (including some Microsoft tools such as AutoRuns) all due to the lack of ImageName. The lack of ImageName is somewhat a security issue since both Process Hacker and Process Explorer are both directly integrated with VirusTotal, Jotti and Comodo cloud services for antiviral/malware analysis and are presently unable to submit Pico processes to those services. We also have a similar problem in our Process Hacker project:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |