Skip to Content
Malware Development for Ethical Hackers
book

Malware Development for Ethical Hackers

by Zhassulan Zhussupov
June 2024
Beginner
402 pages
8h 34m
English
Packt Publishing
Content preview from Malware Development for Ethical Hackers

10

Simple Ciphers

Ciphers are often used in malware to obfuscate malicious code or encrypt data. This chapter focuses on understanding and implementing simple ciphers that are used in malware. In other words, this chapter takes a step back from the complexities of advanced cryptography and focuses on the foundations with simple ciphers. You will be given an overview of basic encryption methods such as Caesar Cipher, substitution cipher, and transposition cipher, which are commonly used for basic data obfuscation. We’ll dive into the mechanism of these ciphers, illustrating their strengths and weaknesses. This chapter also provides practical examples of how these ciphers have been used in real malware and explains why, despite their simplicity, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Evasive Malware

Evasive Malware

Kyle Cucci
The Complete Ethical Hacking Course

The Complete Ethical Hacking Course

Codestars By Rob Percival, Atil Samancioglu
Practical Malware Analysis

Practical Malware Analysis

Michael Sikorski, Andrew Honig

Publisher Resources

ISBN: 9781801810173Supplemental Content