From the course: Penetration Testing and Ethical Hacking
Unlock this course with a free trial
Join today to access over 24,600 courses taught by industry experts.
Malware analysis and countermeasures
From the course: Penetration Testing and Ethical Hacking
Malware analysis and countermeasures
- [Instructor] Malware Analysis and Countermeasures. We're going to take a deep dive looking at malware and the countermeasures to protect systems from malware. So let's jump in. Let's start off first by looking at fileless malware. This is another emerging threat to organizations because it uses legitimate programs like CMD or PowerShell to infect a computer. The concept of being lifeless is that it does not bring any file to the target system. It does not rely on files making detection and removing challenging. So fileless attacks are categorized as low observable characteristics or LOC attacks. So being fileless, stealthy, and defensive evasive makes them often undetectable. Another considerable characteristic of fileless malware is that it operates in memory without installing any files on the disc. So again, because of that, it makes it very hard to detect like traditional malware. Characteristics of fileless malware, heuristic scanners are unable to detect any particular…