Introduction

What?

Prepare an exploit (backdoors, keyloggers, password recovery tools, trojans, …), and deliver it.

Why?

Gain entry into operating systems, applications, and network devices.

How?

  • Creating malware.

  • Tricking unsuspecting users (SE).

  • Embedding malware in software.

  • Downloading malware to the client without the user’s knowledge.

  • Infecting media.