From the course: Ethical Hacking: The Complete Malware Analysis Process
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Automating malware with botnets
From the course: Ethical Hacking: The Complete Malware Analysis Process
Automating malware with botnets
- [Instructor] Malware writers in the cybercrime business ecosystem are now some of the most proficient software writers in the world. However, even with highly skilled people, attacking targets one at a time is still a resource-intensive activity. To make serious money from cybercrime requires automation to carry out attacks at scale. Fortunately for criminals, and by its very nature, cybercrime lends itself to automation. In the early days of computers, viruses propagated through floppy disks. As the internet grew, infections started to appear in file downloads. And as floppy disks phased out, USB drives took their place as a vector for infection. Compromised websites began to host malware and take advantage of browser weaknesses to infect visitors. As the impact of viruses moved from nuisance value to financial gain, so did automation of the crime. By automating and taking advantage of the growing popularity of email and the sheer size of the internet, organized crime was able to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Types of malware3m 36s
-
(Locked)
The evolution of malware3m 40s
-
(Locked)
How malware is delivered2m 35s
-
(Locked)
How malware works3m 15s
-
(Locked)
How malware achieves persistence5m
-
(Locked)
Digging into rootkits4m 20s
-
(Locked)
Automating malware with botnets3m 57s
-
(Locked)
Virus construction kits5m 54s
-
(Locked)
Contemporary malware construction2m 47s
-
(Locked)
The MITRE ATT&CK repository2m
-
-
-
-
-