From the course: Penetration Testing and Ethical Hacking

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Malware analysis and countermeasures

Malware analysis and countermeasures

- [Instructor] Malware Analysis and Countermeasures. We're going to take a deep dive looking at malware and the countermeasures to protect systems from malware. So let's jump in. Let's start off first by looking at fileless malware. This is another emerging threat to organizations because it uses legitimate programs like CMD or PowerShell to infect a computer. The concept of being lifeless is that it does not bring any file to the target system. It does not rely on files making detection and removing challenging. So fileless attacks are categorized as low observable characteristics or LOC attacks. So being fileless, stealthy, and defensive evasive makes them often undetectable. Another considerable characteristic of fileless malware is that it operates in memory without installing any files on the disc. So again, because of that, it makes it very hard to detect like traditional malware. Characteristics of fileless malware, heuristic scanners are unable to detect any particular…

Contents