Chapter 21. Hacking Malware

  • Current trends in malware

  • De-obfuscating malware

  • Reverse engineering malware

Why are we bothering to discuss malware in a book about hacking? One reason is that malware is so pervasive today that it is all but impossible to avoid it. If you know anything at all about computer security, you are likely to be asked for advice on how to deal with some malware-related issue—from how to avoid it in the first place, to how to clean up after an infection. Reverse engineering malware can help you understand the following:

  • How the malware installs itself in order to develop de-installation procedures.

  • Files associated with malware activity to assist in cleanup and detection.

  • What hosts the malware communicates with to assist in ...

Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.