Abuse of Cryptography by Malware

In this chapter, we will protect our tunnel with something more solid than a simple XOR, as modern malware is using a well-known ciphering algorithm to protect its traffic in the transit path.

The topics covered in this chapter are as follows:

  • Introduction to encryption algorithms
  • Protecting your tunnel with AES – stream mode
  • Protecting your tunnel with RSA
  • Hybrid encryption key

Get Python for Offensive PenTest now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.