April 2023
Intermediate to advanced
469 pages
10h 7m
English
In this chapter, we will look at the different techniques that malware authors use to try and “hide” their code from others. The better the tools and analysts get at detecting the malware, the better the attackers get at trying to prevent them from being successful. We will review the concepts of encoding, obfuscated, as well as ICS malware. The first thing we want to think about is encoding.
Encoding – The process of data conversion; we can think of this as a method to make something ...