Chapter 10

Introduction to Malware

In this chapter, you will be analyzing samples of malicious code employed by attackers to compromise computers. By utilizing techniques to monitor the behavior of live malware and digital forensics to examine it in its dormant state, you can begin to understand what its purpose is.

In this chapter, you will learn to

  • Use various tools to monitor malicious code as it is installed and run on the compromised host
  • Use a network-monitoring tool to observe traffic generated by malicious code
  • Create a malware analysis toolkit that can be used to understand what malware is designed to do on victim computer systems

Get Mastering Windows Network Forensics and Investigation, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.