13 EVADING ENDPOINT AND NETWORK DEFENSES
To successfully infiltrate and operate in its target environment, modern malware must survive that environment’s defenses. Many targets, especially those in an enterprise environment, are behind multiple defensive applications and products that work tirelessly to protect the systems and networks that make up the organization’s infrastructure. Malware can take active measures to evade these defenses (for example, by tampering with host defense applications) or take a passive approach to try to slip by them undetected.
In this chapter, I’ll outline different types of defenses that malware could encounter ...
Get Evasive Malware now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.