© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
K. CardwellTactical Wiresharkhttps://doi.org/10.1007/978-1-4842-9291-4_10

10. Dynamic Malware Network Activities

Kevin Cardwell1  
(1)
California, CA, USA
 

In this chapter, we will look at the concept of running the malware and investigating the interaction of the malware with the different components of the host that it is infecting. This will include a review of the different types of infections that target the file system, the memory, the kernel, and the OS. While it is rare that we see this type of interaction today, the interaction with the file system can and does still take place, so it is always a good idea to cover it as well. Again, it is less common, ...

Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.