June 2026
Beginner to intermediate
464 pages
11h 55m
English
In the last chapter, we wrote our first network application, a backdoor. In this chapter, we’ll extend that application to create a dropper, a small program whose goal is to deploy some other program on a target system. In the process, we’ll discuss techniques for avoiding forensic analysis by dropping programs into memory rather than onto the hard disk.
Droppers are traditionally associated with the installation and deployment of malware, but they don’t have to be malicious. Thinking broadly, the typical dropper is just a file transfer program, a program that copies data over a network. ...
Read now
Unlock full access