September 2024
Intermediate to advanced
488 pages
13h 29m
English

To successfully infiltrate and operate in its target environment, modern malware must survive that environment’s defenses. Many targets, especially those in an enterprise environment, are behind multiple defensive applications and products that work tirelessly to protect the systems and networks that make up the organization’s infrastructure. Malware can take active measures to evade these defenses (for example, by tampering with host defense applications) or take a passive approach to try to slip by them undetected.
In this chapter, I’ll outline different types of defenses that malware could encounter ...