O'Reilly logo

Advanced Malware Analysis by Christopher Elisan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER3

Malware Deployment

 

Before malware can do any real damage, it must reach the target system. To reach a target system, the attackers use or abuse different technologies, some of which are legitimate while others are designed purely to deploy malware.

Malware deployment is just as important as the actual capabilities of malware. Without the deployment technology, malware, no matter how sophisticated, will be rendered useless. Think of malware as soldiers. For them to reach their target site, they must be deployed effectively and oftentimes under stealth. This is why capable countries invest in air, land, and sea deployment vehicles for the purpose of successfully carrying soldiers to their target destinations. This is the same concept ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required