Chapter 7: Advanced Malware
In the previous chapter, we learned how to create a very simple malware that executes Windows commands sent by a hacker and returns the results of these commands. This program is very limited in terms of its ability to just execute commands. Ideally, for a Remote Access Tool, we would want to have much more advanced functionalities than this. This chapter will give you a basic idea of what more advanced functionalities you can write inside your malware program. We will cover the following topics in this chapter:
- File transfer
- Stealing Wi-Fi credentials
- Taking screenshots
Building a keylogger file transfer
We have already learned how to send and receive very basic data in the program we developed in Chapter 6,
Get Python Ethical Hacking from Scratch now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.