April 2018
Intermediate to advanced
176 pages
4h 16m
English
In this chapter, we will protect our tunnel with something more solid than a simple XOR, as modern malware is using a well-known ciphering algorithm to protect its traffic in the transit path.
The topics covered in this chapter are as follows: