Hiding in Plain Sight
Next-Generation Techniques and Tools for Avoidance and Obfuscation
Information in this chapter
• Malware Quality Assurance Testing
• IP Attribution
• IP Spoofing
Introduction
In this chapter, we discuss some of the techniques that cyber actors use to hide in plain sight. The point of these tools is to mask the delivery, source, and ability to bypass commonly used information assurance hardware and software in order to carry out the specific attack. Before we dive into the specific tools, we briefly discuss malware quality assurance (QA) testing. The steps involved in the QA can range from online tools to local QA tools that run from the comfort of your test lab. On the basis of the level and target of the attack, it can ...
Get Cybercrime and Espionage now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.