Malware and Persistence

  • Mike O’Leary


 Chapter 2 shows how attackers can use browsers and software that provide active content for browsers such as Java and Adobe Flash as vectors to get an initial foothold in a network. Another option is malware. Malicious documents, like Word documents, can be used to provide an attacker with an initial shell on a target system.


Virtual Machine Window System File Descriptor Packet Capture Domain Controller 

Copyright information

© Mike O'Leary 2015

Authors and Affiliations

  • Mike O’Leary
    • 1
  1. 1.Department of MathematicsTowson UniversityTowsonUS

Personalised recommendations