From the course: Ethical Hacking: The Complete Malware Analysis Process
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Hiding malware
From the course: Ethical Hacking: The Complete Malware Analysis Process
Hiding malware
- [Instructor] Early malware was written as any other software with code designed just to achieve the exploit and install or execute a payload. However, once the malware had been detected on a target, antivirus companies soon created a signature for the malware and installed it in their products. The next target was then able to defeat the malware by detecting it before it had a chance to execute. Another problem was that malware tends to have distinct types of coding structures, meaning that even without a signature, a good antivirus product can detect likely malware and quarantine it for further inspection. Malware writers soon worked out a range of techniques to avoid being defeated even if the malware had previously been detected. An early approach that became popular was obfuscation, for example masking the executable code by XORing it and including a small routine to recover the executable code at the start of the malware. In 2003, a buffer overflow was found in the Microsoft…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Hiding malware5m 31s
-
(Locked)
Malware that changes its spots1m 49s
-
(Locked)
Polymorphic malware5m 37s
-
(Locked)
Using cryptography in ransomware5m 20s
-
(Locked)
Understanding advanced persistent threats1m 30s
-
(Locked)
Analyzing Win32.Sodin3m 50s
-
(Locked)
Analyzing black and grey energy7m 32s
-
(Locked)
Understanding log4shell4m 22s
-
(Locked)
-
-