Malware Development for Ethical Hackers: Learn to develop various types of malware to strengthen cybersecurity
Author: Zhassulan Zhussupov (Author)
Publisher finelybook 出版社: Packt Publishing – ebooks Account
Edition 版本: 1st
Publication Date 出版日期: 2024-07-09
Language 语言: English
Print Length 页数: 531 pages
ISBN-10: 1801810176
ISBN-13: 9781801810173
Book Description
Packed with real-life examples, this book simplifies cybersecurity, delves into malware development, and is a must-read for advanced ethical hackers
Key Features
- Learn to develop malware and exploit vulnerabilities using hands-on examples
- Understand responsible hacking, ethical guidelines, and legal aspects surrounding malware development
- Explore methods to bypass security mechanisms and make malware undetectable on compromised systems
Book Description
Malware Development for Ethical Hackers will be a comprehensive guide that explores the dark side of cybersecurity within an ethical context. This unique book takes readers on a journey through the intricate world of malware development, shedding light on the techniques and strategies employed by cybercriminals, all while emphasizing the ethical considerations that ethical hackers must uphold. The book will provide practical experience in creating and re-implementing popular techniques encountered in real-life malicious applications, such as Carbanak, Carberp, Stuxnet, Conti, Babuk, and BlackCat ransomware.
This book will equip aspiring ethical hackers and cybersecurity professionals with the knowledge and skills necessary to understand and effectively combat malicious software. It unveils the secrets behind malware development, delving into the intricate details of programming, exploit techniques, evasion mechanisms, and more.
What you will learn
- Learn the logic of real malware developers for cybersecurity
- Study the development of malware over the years with examples
- Understand the process of reconstructing APT attacks and their techniques
- Design methods to bypass security mechanisms for your Red Team scenarios
- Explore over 100 working examples of malware
- Comprehend the close relationship between mathematics and modern malware
Who this book is for
The primary audience of the book is Penetration Testers, Exploit Developers, Ethical Hackers, Red Teamers and Offensive Security Researchers. Anyone interested in cybersecurity and ethical hacking will also find this book very helpful.
Table of Contents
- Quick Introduction to Malware Development
- Exploring Various Malware Injection Attacks
- Mastering Malware Persistence Mechanisms
- Mastering Privilege Escalation on Compromised Systems
- Anti-Debugging Tricks
- Navigating Anti-Virtual Machine Strategies
- Strategies for Anti-disassembly
- Navigating the Antivirus Labyrinth: A Game of Cat and Mouse
- Exploring Hash Algorithms
- Simple Ciphers
- Unveiling Common Cryptography in Malware
- Advanced Maths Algorithms and Custom Encoding
- Classic Malware Examples
- APT and Cybercrime
- Malware Source Code Leaks
- Ransomware and Modern Threats