From the course: Ethical Hacking: The Complete Malware Analysis Process
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
How malware is delivered
From the course: Ethical Hacking: The Complete Malware Analysis Process
How malware is delivered
- [Instructor] Hackers are always seeking ways to get their malware into your system. One way malware can get in is when you insert an infected USB stick and the malware is executed by the automatic run feature which can be enabled for USB devices. It can also get in when you click on an email attachment. Early viruses attached themselves as executable code. But most users are well aware they shouldn't click on any executable attachment. However, viruses can also execute by using a macro to trigger code in a document. The third main vector used by malware is downloading itself when you visit a malicious website. It does this by hiding malicious code in the webpage and exploiting a vulnerability in your browser. Once a virus infects its host, then it checks for vectors to propagate itself, such as writing itself to and so infecting any USB stick that's inserted. It might even create an email message and send it out to people in your address book with a copy of itself as an attachment…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Types of malware3m 36s
-
(Locked)
The evolution of malware3m 40s
-
(Locked)
How malware is delivered2m 35s
-
(Locked)
How malware works3m 15s
-
(Locked)
How malware achieves persistence5m
-
(Locked)
Digging into rootkits4m 20s
-
(Locked)
Automating malware with botnets3m 57s
-
(Locked)
Virus construction kits5m 54s
-
(Locked)
Contemporary malware construction2m 47s
-
(Locked)
The MITRE ATT&CK repository2m
-
-
-
-
-