loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  (Next)
  ALL

M

MAC Address

A hardware address associated with a network interface. MAC addresses can be useful in local network investigations (Wi-Fi association logs, router DHCP tables), but modern devices may randomize MAC addresses, reducing reliability for long-term attribution.

Mainnet

The primary production network of a blockchain (as opposed to testnet).

Malware

Malicious software designed to disrupt operations, steal data, or gain unauthorized access. Malware investigations may involve reverse engineering, log analysis, persistence mechanisms, command-and-control infrastructure, and correlation with known threat actor behaviors.

Malware Analysis

Malware analysis is the process of studying and examining malicious software (malware) in order to understand how it works, what it does, and how it can be detected and removed. This is typically done by security professionals, researchers, and other experts who specialize in analyzing and identifying malware threats.

There are several different techniques and approaches that can be used in malware analysis, including:

  1. Static analysis: This involves examining the code or structure of the malware without actually executing it. This can be done manually or using automated tools, and can help identify the specific functions and capabilities of the malware.

  2. Dynamic analysis: This involves running the malware in a controlled environment (such as a sandbox) in order to observe its behavior and effects. This can help identify how the malware interacts with other systems and processes, and what it is designed to do.

  3. Reverse engineering: This involves disassembling the malware and examining its underlying code in order to understand how it works and what it does. This can be done manually or using specialized tools.

Examples of malware analysis include:

  1. Identifying a new strain of ransomware and determining how it encrypts files and demands payment from victims.

  2. Analyzing a malware sample to determine its origin, target, and intended purpose.

  3. Examining a malicious email attachment in order to understand how it infects a computer and what it does once it is executed.

  4. Reverse engineering a piece of malware to identify vulnerabilities or weaknesses that can be exploited to remove or mitigate its effects.



Master File Table (MFT)

The core metadata structure in NTFS that stores records describing every file and directory on the volume, including attributes and disk location data.

MBR

The master boot record (MBR) is a small piece of code located on the first sector of a hard drive that is responsible for booting the operating system. When a computer is turned on, the MBR is loaded into memory and executes the bootloader, which then loads the operating system.

The MBR consists of several components, including:

  1. A bootstrap program: This is a small piece of code that is responsible for loading the bootloader into memory.

  2. A partition table: This table contains information about the layout of the hard drive, including the location and size of each partition.

  3. A disk signature: This is a unique identifier for the hard drive that is used to identify it to the operating system.

The MBR has a fixed size of 512 bytes and is typically stored on a hard drive in the first sector. It is important to note that the MBR is separate from the bootloader and the operating system, and is not affected by changes to these components.

One example of the importance of the MBR is in the case of malware that infects the MBR. Some types of malware, such as bootkits, are designed to infect the MBR and modify the boot process in order to gain access to the system. This can allow the malware to persist even after the operating system is reinstalled, making it difficult to remove.

In order to protect against MBR infections, it is important to regularly update the operating system and antivirus software, and to be cautious when downloading and installing software from untrusted sources. Additionally, it is a good practice to regularly create backups of the MBR in case it is compromised.



MD5

A legacy hash algorithm sometimes still encountered in forensic workflows and tool outputs. MD5 is fast but has known collision weaknesses; many agencies prefer stronger hashes (like SHA-256) while still documenting MD5 where required for compatibility.

Memory Management

The operating system function that allocates, tracks, and protects system memory. It includes paging, virtual memory, segmentation, and memory isolation between processes.

Mempool

The set of valid, unconfirmed transactions awaiting inclusion in a block.

Message Authentication Code (MAC)

A cryptographic checksum that ensures integrity and authenticity using a shared secret key. MACs do not provide non-repudiation because both parties share the same key.


Page:  1  2  3  (Next)
  ALL