Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Malware Development for Ethical Hackers
Malware Development for Ethical Hackers

Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity

eBook
$29.99 $43.99
Paperback
$37.99 $54.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Table of content icon View table of contents Preview book icon Preview Book

Malware Development for Ethical Hackers

Part 1: Malware Behavior: Injection, Persistence, and Privilege Escalation Techniques

In this part, we explore the fundamental behaviors of malware, examining how it operates within systems, maintains persistence, and gains elevated privileges to carry out its malicious objectives. With a deep explanation of malware development and coverage of advanced techniques such as injection attacks and privilege escalation, this section provides a solid foundation for you to explore the complex realm of offensive programming and cybersecurity.

This part contains the following chapters:

  • Chapter 1, A Quick Introduction to Malware Development
  • Chapter 2, Exploring Various Malware Injection Attacks
  • Chapter 3, Mastering Malware Persistence Mechanisms
  • Chapter 4, Mastering Privilege Escalation on Compromised Systems
Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Learn how to develop and program Windows malware applications using hands-on examples
  • Explore methods to bypass security mechanisms and make malware undetectable on compromised systems
  • Understand the tactics and tricks of real adversaries and APTs and apply their experience in your operations
  • Purchase of the print or Kindle book includes a free PDF eBook

Description

Malware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context. This book takes you on a journey through the intricate world of malware development, shedding light on the techniques and strategies employed by cybercriminals. As you progress, you’ll focus on the ethical considerations that ethical hackers must uphold. You’ll also gain practical experience in creating and implementing popular techniques encountered in real-world malicious applications, such as Carbanak, Carberp, Stuxnet, Conti, Babuk, and BlackCat ransomware. This book will also equip you with the knowledge and skills you need to understand and effectively combat malicious software. By the end of this book, you'll know the secrets behind malware development, having explored the intricate details of programming, evasion techniques, persistence mechanisms, and more.

Who is this book for?

This book is for penetration testers, exploit developers, ethical hackers, red teamers, and offensive security researchers. Anyone interested in cybersecurity and ethical hacking will also find this book helpful. Familiarity with core ethical hacking and cybersecurity concepts will help you understand the topics discussed in this book more easily.

What you will learn

  • Familiarize yourself with the logic of real malware developers for cybersecurity
  • Get to grips with the development of malware over the years using examples
  • Understand the process of reconstructing APT attacks and their techniques
  • Design methods to bypass security mechanisms for your red team scenarios
  • Explore over 80 working examples of malware
  • Get to grips with the close relationship between mathematics and modern malware
Estimated delivery fee Deliver to Russia

Economy delivery 10 - 13 business days

$6.95

Premium delivery 6 - 9 business days

$21.95
(Includes tracking information)

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jun 28, 2024
Length: 390 pages
Edition : 1st
Language : English
ISBN-13 : 9781801810173
Category :
Concepts :

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Estimated delivery fee Deliver to Russia

Economy delivery 10 - 13 business days

$6.95

Premium delivery 6 - 9 business days

$21.95
(Includes tracking information)

Product Details

Publication date : Jun 28, 2024
Length: 390 pages
Edition : 1st
Language : English
ISBN-13 : 9781801810173
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 106.97 154.97 48.00 saved
API Security for White Hat Hackers
$30.99 $44.99
Malware Development for Ethical Hackers
$37.99 $54.99
Automating Security Detection Engineering
$37.99 $54.99
Total $ 106.97 154.97 48.00 saved Stars icon

Table of Contents

22 Chapters
Part 1: Malware Behavior: Injection, Persistence, and Privilege Escalation Techniques Chevron down icon Chevron up icon
Chapter 1: A Quick Introduction to Malware Development Chevron down icon Chevron up icon
Chapter 2: Exploring Various Malware Injection Attacks Chevron down icon Chevron up icon
Chapter 3: Mastering Malware Persistence Mechanisms Chevron down icon Chevron up icon
Chapter 4: Mastering Privilege Escalation on Compromised Systems Chevron down icon Chevron up icon
Part 2: Evasion Techniques Chevron down icon Chevron up icon
Chapter 5: Anti-Debugging Tricks Chevron down icon Chevron up icon
Chapter 6: Navigating Anti-Virtual Machine Strategies Chevron down icon Chevron up icon
Chapter 7: Strategies for Anti-Disassembly Chevron down icon Chevron up icon
Chapter 8: Navigating the Antivirus Labyrinth – a Game of Cat and Mouse Chevron down icon Chevron up icon
Part 3: Math and Cryptography in Malware Chevron down icon Chevron up icon
Chapter 9: Exploring Hash Algorithms Chevron down icon Chevron up icon
Chapter 10: Simple Ciphers Chevron down icon Chevron up icon
Chapter 11: Unveiling Common Cryptography in Malware Chevron down icon Chevron up icon
Chapter 12: Advanced Math Algorithms and Custom Encoding Chevron down icon Chevron up icon
Part 4: Real-World Malware Examples Chevron down icon Chevron up icon
Chapter 13: Classic Malware Examples Chevron down icon Chevron up icon
Chapter 14: APT and Cybercrime Chevron down icon Chevron up icon
Chapter 15: Malware Source Code Leaks Chevron down icon Chevron up icon
Chapter 16: Ransomware and Modern Threats Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Most Recent
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.3
(9 Ratings)
5 star 66.7%
4 star 22.2%
3 star 0%
2 star 0%
1 star 11.1%
Filter icon Filter
Most Recent

Filter reviews by




Tiffany Fannon Oct 02, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I am an ethical hacker with 5 years in the business and found Malware Development for Ethical Hackers to be a valuable resource that offers a comprehensive look in the world of malware development. The book provides a unique perspective by exploring the techniques and strategies that cybercriminals employed. Yet maintains the focus of ethical considerations. I think this would be a good read for those that want to get in cybersecurity as an ethical hacker, exploit developer and security researchers. While it doesn't go into every detail of malware development, it gives security professionals a good start.
Amazon Verified review Amazon
Matt Johnson Sep 03, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
"Malware Development for Ethical Hackers" is a hands-on guide for anyone interested in understanding the inner workings of malware from an ethical perspective. The book begins with an introduction to malware development, covering concepts and tools. It then dives into various attack techniques, including malware injection, persistence, and privilege escalation on Windows systems.As you progress, you'll learn about anti-debugging tricks, anti-virtual machine strategies, and anti-disassembly techniques to strengthen your code. The book also covers how to navigate antivirus systems, use hash algorithms, and implement ciphers.It discusses advanced math algorithms, classic malware examples, and modern threats like ransomware, providing both context and practical insights. This book is a great resource for anyone aiming to deepen their knowledge of malware development.
Amazon Verified review Amazon
mr steven k lawrence Aug 30, 2024
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
After finishing my Masters degree, which briefly covered malware I was eager to explore this complex field further. "Malware Development for Ethical Hackers" by Zhassulan Zhussupov provided the in depth exploration I was looking for. Despite not being a developer or ethical hacker I found this book to be clear and informative.The book does a good job of explaining malware and how to executie it with examples. Helped by the presentation of the material in an accessible way even for someone like me who isn't well versed in malware development. The inclusion of code that can be easily accessed from GitHub is particularly useful. It allowed me to experiment and gain an understanding of how malware functions without the pressure of creating every line of code from scratch. This feature alone makes the book a valuable resource for anyone in expanding their cybersecurity knowledge.While I have no plans to create malware myself the insights and practical demonstrations in this book have significantly enhanced my understanding of the subject. They have sharpened my ability to critically analyse security issues. Enriched my overall expertise in the field."Malware Development for Ethical Hackers" proves itself to be a resource, for individuals looking to deepen their understanding of malware through hands on learning.Whether you're a student, a cybersecurity professional or simply curious, about the subject this book offers engaging content.
Amazon Verified review Amazon
William Aug 29, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is an outstanding resource for anyone looking to excel in cybersecurity. This book delivers comprehensive coverage of malware development, from foundational concepts to advanced tactics like Anti-Debugging and Anti-VM techniques. Zhussupov does an excellent job of making complex topics accessible, with practical examples that make the content immediately applicable. Whether you’re a seasoned professional or an ethical hacker looking to expand your skill set, this book is a must-have. Highly recommended!
Amazon Verified review Amazon
Shane Rudy Aug 28, 2024
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
I've been pentesting since 2008. In 2019 I developed my first C2 instance and have been interested in this subject matter ever since. The book is well organized and thought out and gives you what I call necessary basics that all beginners and even seasoned experts should know along with deeper topics suited for more seasoned individuals. You do need a pretty decent background in the languages discussed in the book especially C/C++. The code examples are well done which can be rare for books like this and the authors know and understand windows internals really well which is another art all in of itself that is rare to find or even master. The chapters are well thought out and honestly would be the same order that I'd probably put them in if I was writing a book like this. The only thing I did not like about the book which was written in 2024 is the use of Windows 7 and Windows 10 as operating systems in the examples. I would have liked to have seen more Windows 11 and potentially some newer server operating systems used in the book which brings about newer more up to date methods of exploitation, obfuscation and evasion techniques.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is the delivery time and cost of print book? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela
What is custom duty/charge? Chevron down icon Chevron up icon

Customs duty are charges levied on goods when they cross international borders. It is a tax that is imposed on imported goods. These duties are charged by special authorities and bodies created by local governments and are meant to protect local industries, economies, and businesses.

Do I have to pay customs charges for the print book order? Chevron down icon Chevron up icon

The orders shipped to the countries that are listed under EU27 will not bear custom charges. They are paid by Packt as part of the order.

List of EU27 countries: www.gov.uk/eu-eea:

A custom duty or localized taxes may be applicable on the shipment and would be charged by the recipient country outside of the EU27 which should be paid by the customer and these duties are not included in the shipping charges been charged on the order.

How do I know my custom duty charges? Chevron down icon Chevron up icon

The amount of duty payable varies greatly depending on the imported goods, the country of origin and several other factors like the total invoice amount or dimensions like weight, and other such criteria applicable in your country.

For example:

  • If you live in Mexico, and the declared value of your ordered items is over $ 50, for you to receive a package, you will have to pay additional import tax of 19% which will be $ 9.50 to the courier service.
  • Whereas if you live in Turkey, and the declared value of your ordered items is over € 22, for you to receive a package, you will have to pay additional import tax of 18% which will be € 3.96 to the courier service.
How can I cancel my order? Chevron down icon Chevron up icon

Cancellation Policy for Published Printed Books:

You can cancel any order within 1 hour of placing the order. Simply contact customercare@packt.com with your order details or payment transaction id. If your order has already started the shipment process, we will do our best to stop it. However, if it is already on the way to you then when you receive it, you can contact us at customercare@packt.com using the returns and refund process.

Please understand that Packt Publishing cannot provide refunds or cancel any order except for the cases described in our Return Policy (i.e. Packt Publishing agrees to replace your printed book because it arrives damaged or material defect in book), Packt Publishing will not accept returns.

What is your returns and refunds policy? Chevron down icon Chevron up icon

Return Policy:

We want you to be happy with your purchase from Packtpub.com. We will not hassle you with returning print books to us. If the print book you receive from us is incorrect, damaged, doesn't work or is unacceptably late, please contact Customer Relations Team on customercare@packt.com with the order number and issue details as explained below:

  1. If you ordered (eBook, Video or Print Book) incorrectly or accidentally, please contact Customer Relations Team on customercare@packt.com within one hour of placing the order and we will replace/refund you the item cost.
  2. Sadly, if your eBook or Video file is faulty or a fault occurs during the eBook or Video being made available to you, i.e. during download then you should contact Customer Relations Team within 14 days of purchase on customercare@packt.com who will be able to resolve this issue for you.
  3. You will have a choice of replacement or refund of the problem items.(damaged, defective or incorrect)
  4. Once Customer Care Team confirms that you will be refunded, you should receive the refund within 10 to 12 working days.
  5. If you are only requesting a refund of one book from a multiple order, then we will refund you the appropriate single item.
  6. Where the items were shipped under a free shipping offer, there will be no shipping costs to refund.

On the off chance your printed book arrives damaged, with book material defect, contact our Customer Relation Team on customercare@packt.com within 14 days of receipt of the book with appropriate evidence of damage and we will work with you to secure a replacement copy, if necessary. Please note that each printed book you order from us is individually made by Packt's professional book-printing partner which is on a print-on-demand basis.

What tax is charged? Chevron down icon Chevron up icon

Currently, no tax is charged on the purchase of any print book (subject to change based on the laws and regulations). A localized VAT fee is charged only to our European and UK customers on eBooks, Video and subscriptions that they buy. GST is charged to Indian customers for eBooks and video purchases.

What payment methods can I use? Chevron down icon Chevron up icon

You can pay with the following card types:

  1. Visa Debit
  2. Visa Credit
  3. MasterCard
  4. PayPal
What is the delivery time and cost of print books? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela