Investigating malware, including the different types of malware, persistence mechanisms, using external research
Keywords
operating systems
forensics
operating environments
INFORMATION INCLUDED IN THIS CHAPTER:
• Malware Categories
• Using Malware Researchers
• Persistence
• Infection Vectors
• Malware Artifacts
Introduction
It is difficult to start this without using some hackneyed, clichéd expression that dramatically understates the challenge or does not put it into some useful perspective. The short version is that malware is a problem. There are millions of new types of malware developed each year. This may be an existing piece of malware that is just different enough to require a new signature, means that the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.