CHAPTER 10

Maintaining Access

In this chapter, you will learn about

•   Malware categories

•   Trojan horses

•   Backdoors

•   Rootkits

•   Tools like Rekall and Volatility

Malware is commonly categorized depending on the function it has and operation it performs. As such, a piece of code that monitors a user’s browsing history can be classified as spyware, while software that keeps displaying advertisements against the user’s desire is known as adware. Regardless of the category, there’s a common goal: perform some action that will harm a machine or access it without user consent, with an intention of performing tasks against the user’s will, like data theft.

Malware Categories

Attackers can do all sorts of things and use different types ...

Get GCIH GIAC Certified Incident Handler All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.