Chapter 12 Notes

to accompany Sikorski and Honig, Practical Malware Analysis, no starch press.

In the printed book this is Chapter 11.

Malware Behavior

A whirlwind tour of malware functionality

Downloaders and Launchers

Backdoors

Reverse Shells

RATs

Botnets

Credential Stealers

Persistence Mechanisms

Privilege Escalation

User-mode Rootkits