From 75c35d9abe27a110044c9c7aea39d06047ec5ebf Mon Sep 17 00:00:00 2001 From: Tyler Perkins Date: Tue, 8 Mar 2022 14:45:01 -0500 Subject: [PATCH] Update for 08-03-22 14:45 --- tech/malware.wiki | 37 +++++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) diff --git a/tech/malware.wiki b/tech/malware.wiki index 55ac97a..9462c5c 100644 --- a/tech/malware.wiki +++ b/tech/malware.wiki @@ -56,3 +56,40 @@ Capture keystrokes on a compromised system Code inserted into malware by intruder. Lies dormant until a condition is met, then code triggers some payload. + +== Macro virus == + +Virus using macro scripting code, typically embedded in a document or document +template, and triggered when the document is viewed/edited, to run and +replicate into other documents. + +== Mobile code == + +Software that can be shipped unchanged to a htereogenous colelctions of +platforms and execute with identical semantics. + +== Rootkit == + +Tools used after a system has been compromised to gain root level access + +== Spyware == + +Software that monitors keystrokes, screen data, and/or network traffic, or +scans files for sensitive information, and sends it back to some Controler +server. + +== Trojan horse == + +Appears to have useful function, but has hidden and malicous purpose and evades +security machanisms, sometimes by exploiting legit authorizations of system +entity that invoked it + +== Virus == + +Malware that when executed, attempts to replicate itself and propigate itself. + +== Worm == + +Malware that can run independently and can propagate a complete working version +of itself onto other hosts on a network, by exploiting software vulns in the +target system, or using capture credentials