© Mike O'Leary 2019
Mike O'LearyCyber Operationshttps://doi.org/10.1007/978-1-4842-4294-0_11

11.  Malware and Persistence

Mike O’Leary1 
(1)
Towson, MD, USA
 

Introduction

Chapter 2 shows some elementary ways an attacker can gain an initial foothold on a network using active content in a browser or some simple malware generated through msfconsole. The Metasploit package also includes msfvenom, a tool that can be used to create more sophisticated malware. A limitation of msfvenom is that the malware it generates is often caught by modern antivirus products. Veil-Evasion can be used to craft malware that is not usually detected by antivirus.

An attacker that has compromised a target wants to retain access to that system; an attacker can create persistence ...

Get Cyber Operations: Building, Defending, and Attacking Modern Computer Networks now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.