3.4 Stealth – a game of hide-and-seek

Malware needs to hide from the victim and antivirus. When a malware is executed on Windows, it creates its own file and registry entry in the system. It launches its own process and creates network connections. Malware can hide its files, process, and registry in multiple ways:

  • File properties
  • Injecting code into the legitimate process
  • Using rootkits
  • Fileless malware
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.175.180