Introduction to Malware
In this chapter, you will be analyzing samples of malicious code employed by attackers to compromise computers. By utilizing techniques to monitor the behavior of live malware and digital forensics to examine it in its dormant state, you can begin to understand what its purpose is.
In this chapter, you will learn to
- Use various tools to monitor malicious code as it is installed and run on the compromised host
- Use a network-monitoring tool to observe traffic generated by malicious code
- Create a malware analysis toolkit that can be used to understand what malware is designed to do on victim computer systems