Chapter 5

Execution

Information in this chapter:

ent How Cybercriminals Execute Their Schemes Using Malicious Code and Content for Profit

ent Identifying the Market

ent Identifying the Target Audience

Introduction

In the first four chapters of this book, we investigated concepts dealing with psychology, history, motive, and patterns of behavior among cybercriminals. In this chapter, we will explore how cybercriminals execute their attacks. What is required for ...

Get Blackhatonomics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.