June 2024
Beginner
402 pages
8h 34m
English
When we talk about malware injection, we’re referring to the technique of injecting malicious code into a running program. This type of attack can be difficult to detect and defend against because the malware can piggyback on an already-trusted program. It can use the legitimate program’s access to the system to cause damage or steal data. In this chapter, we’ll explore the different ways this type of attack can be carried out, and how you can protect yourself from it.
In this chapter, we’re going to cover the following main topics: