-
Book Overview & Buying
-
Table Of Contents
Malware Development for Ethical Hackers
By :
Malware Development for Ethical Hackers
By:
Overview of this book
Malware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context.
This book takes you on a journey through the intricate world of malware development, shedding light on the techniques and strategies employed by cybercriminals. As you progress, you’ll focus on the ethical considerations that ethical hackers must uphold. You’ll also gain practical experience in creating and implementing popular techniques encountered in real-world malicious applications, such as Carbanak, Carberp, Stuxnet, Conti, Babuk, and BlackCat ransomware. This book will also equip you with the knowledge and skills you need to understand and effectively combat malicious software.
By the end of this book, you'll know the secrets behind malware development, having explored the intricate details of programming, evasion techniques, persistence mechanisms, and more.
*Email sign-up and proof of purchase required
Table of Contents (24 chapters)
Preface
Part 1: Malware Behavior: Injection, Persistence, and Privilege Escalation Techniques
Chapter 1: A Quick Introduction to Malware Development
Chapter 2: Exploring Various Malware Injection Attacks
Chapter 3: Mastering Malware Persistence Mechanisms
Chapter 4: Mastering Privilege Escalation on Compromised Systems
Part 2: Evasion Techniques
Chapter 5: Anti-Debugging Tricks
Chapter 6: Navigating Anti-Virtual Machine Strategies
Chapter 7: Strategies for Anti-Disassembly
Chapter 8: Navigating the Antivirus Labyrinth – a Game of Cat and Mouse
Part 3: Math and Cryptography in Malware
Chapter 9: Exploring Hash Algorithms
Chapter 10: Simple Ciphers
Chapter 11: Unveiling Common Cryptography in Malware
Chapter 12: Advanced Math Algorithms and Custom Encoding
Part 4: Real-World Malware Examples
Chapter 13: Classic Malware Examples
Chapter 14: APT and Cybercrime
Chapter 15: Malware Source Code Leaks
Chapter 16: Ransomware and Modern Threats
Chapter 17: Unlock Your Book’s Exclusive Benefits
Index
Other Books You May Enjoy