Part 1: Malware Behavior: Injection, Persistence, and Privilege Escalation Techniques
In this part, we explore the fundamental behaviors of malware, examining how it operates within systems, maintains persistence, and gains elevated privileges to carry out its malicious objectives. With a deep explanation of malware development and coverage of advanced techniques such as injection attacks and privilege escalation, this section provides a solid foundation for you to explore the complex realm of offensive programming and cybersecurity.
This part contains the following chapters:
- Chapter 1, A Quick Introduction to Malware Development
- Chapter 2, Exploring Various Malware Injection Attacks
- Chapter 3, Mastering Malware Persistence Mechanisms
- Chapter 4, Mastering Privilege Escalation on Compromised Systems