In this chapter, we will look at the concept of running the malware and investigating the interaction of the malware with the different components of the host that it is infecting. This will include a review of the different types of infections that target the file system, the memory, the kernel, and the OS. While it is rare that we see this type of interaction today, the interaction with the file system can and does still take place, so it is always a good idea to cover it as well. Again, it is less common, ...
10. Dynamic Malware Network Activities
Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.