June 2024
Beginner
402 pages
8h 34m
English
Malware uses sophisticated cryptography to secure its communication and protect its payload. How can we use cryptography to hide malware settings and configurations? How can we use cryptography to hide a payload? Let’s try to answer these questions and cover some practical examples to aid with our understanding. This chapter will explore the most commonly used cryptographic techniques in malware.
In this chapter, we’re going to cover the following main topics:
In this chapter, we will use the Kali Linux (https://www.kali.org/) and Parrot ...