CATEGORY: Cybersecurity and
9.4 – Malware Setup, FUD and Avoidance (Part 2)
Setup Port forwarding (on Attacker’s system)
After delivering Trojan to your victim, you only need to do one more thing on your system – enable...
9.3 – Malware Setup, FUD and Avoidance (Part 1)
There are two types of Trojan attacks used by attackers to control their victims: local connection and remote connection. In local connection, an attacker...
9.2 – Methods of Malware Analysis
In this section, let us examine some of the methods which are used in malware analysis.
Detecting Packed/Obfuscated: Packed or unpacked malware is malware that...
9.1 – Malware Analysis – Goals and Types
Malware analysis is vital to understand malware actions. It helps firms understand existing exposure to malware by providing crime-ware analysis especially after incidence. There...
9.0 – Malware – Variants, Infections and Effects
The following are some of the major variants of malware:
Virus: A virus is a program that reproduces its own code by attaching itself to...