Introduction
What?
Prepare an exploit (backdoors, keyloggers, password recovery tools, trojans, …), and deliver it.
Why?
Gain entry into operating systems, applications, and network devices.
How?
Creating malware.
Tricking unsuspecting users (SE).
Embedding malware in software.
Downloading malware to the client without the user’s knowledge.
Infecting media.