June 2024
Beginner
402 pages
8h 34m
English
The inadvertent or purposeful exposure of malware source code can be a boon for cyber security researchers, but also a catalyst for the spread of more sophisticated malicious software. This chapter examines several significant historical incidents of malware source code leaks and the consequent implications for cyber security. It provides an in-depth look at how leaks occur, the information that can be gleaned from them, and how these leaks have spurred the development of more advanced malware tricks. You will gain insights into real-life malware and learn how to analyze leaked code for offensive purposes.
In this chapter, we’re going to cover the following main topics: