If you want to know how a malware will behave, the easiest way to achieve that goal is to let it run rampant in your network, and track its behavior in the wild. This is not how you want to get to understand the malware's behavior. You might easily miss something that your network environment doesn't enact, and now you have to remove the malware from all of the machines in your network. Kali has some selected tools to help you do that. This chapter also covers stress testing your Windows server or application. This is a great idea, if you want to discover how much DDoS will turn your server belly-up. This chapter is the beginning of how to develop an anti-fragile, self-healing, Windows network.
This chapter will cover the following topics:
Setting up a test environment
Reverse engineering theory
Working with Boolean logic
Practicing reverse engineering
Debuggers
Disassembly
Miscellaneous RE tools
Stress testing your Windows machine
There are some changes...