Malware Binary Signing
Source provenance. Raw material catalogued for the wiki ingest pipeline. Lives offline at
raw_sources/offensive-security/Malware Binary Signing.md.
Status: catalogued
Excerpt
Module 32 - Malware Binary Signing When a user attempts to download a legitimate executable file from the internet, it is often signed by the company as a way of proving to the user that it is a trustworthy executable. Although security solutions will still scan the executable, additional scrutiny would’ve been placed on it had the binary been unsigned. This module walks through the steps required…
Likely wiki targets
Pending — this source has not yet been distilled into wiki pages. Future ingest can populate links to the concept / technique / CVE pages this material would inform.
