September 2021
Intermediate to advanced
376 pages
9h 25m
English
Things are not always what they seem; the first appearance deceives many; the intelligence of a few perceives what has been carefully hidden.
–Phaedrus

Consider the following scenario: an attacker, pretending to be the head of IT, sends an email to an employee. The email tells the victim to download the updated version of the Alpine email client. But, unbeknownst to the victim, the attacker has embedded an implant in the program. When the victim installs the client, the installer will install the implant, too.
All ethical hackers should understand the mechanisms of implants like these. Implants concealed within legitimate files ...