If you want to know how malware will behave, the easiest way to achieve that goal is to let it run rampant in your network and track its behavior in the wild. This is not how you want to get to understand malware behavior. You might easily miss something that your network environment doesn't enact, and then you'll have to remove the malware from all of the machines in your network. Kali has some selected tools to help you do that. This chapter also covers stress testing your Windows server or application. This is a great idea, if you want to discover how much DDoS will turn your server belly-up. This chapter is the beginning of how to develop an anti-fragile, self-healing Windows network.
We will learn about the following topics in this chapter:
- Setting up a test environment
- Reverse Engineering theory
- Working with Boolean logic...