Update for 08-03-22 14:45
This commit is contained in:
parent
4432cb1eb2
commit
75c35d9abe
@ -56,3 +56,40 @@ Capture keystrokes on a compromised system
|
|||||||
|
|
||||||
Code inserted into malware by intruder. Lies dormant until a condition is met,
|
Code inserted into malware by intruder. Lies dormant until a condition is met,
|
||||||
then code triggers some payload.
|
then code triggers some payload.
|
||||||
|
|
||||||
|
== Macro virus ==
|
||||||
|
|
||||||
|
Virus using macro scripting code, typically embedded in a document or document
|
||||||
|
template, and triggered when the document is viewed/edited, to run and
|
||||||
|
replicate into other documents.
|
||||||
|
|
||||||
|
== Mobile code ==
|
||||||
|
|
||||||
|
Software that can be shipped unchanged to a htereogenous colelctions of
|
||||||
|
platforms and execute with identical semantics.
|
||||||
|
|
||||||
|
== Rootkit ==
|
||||||
|
|
||||||
|
Tools used after a system has been compromised to gain root level access
|
||||||
|
|
||||||
|
== Spyware ==
|
||||||
|
|
||||||
|
Software that monitors keystrokes, screen data, and/or network traffic, or
|
||||||
|
scans files for sensitive information, and sends it back to some Controler
|
||||||
|
server.
|
||||||
|
|
||||||
|
== Trojan horse ==
|
||||||
|
|
||||||
|
Appears to have useful function, but has hidden and malicous purpose and evades
|
||||||
|
security machanisms, sometimes by exploiting legit authorizations of system
|
||||||
|
entity that invoked it
|
||||||
|
|
||||||
|
== Virus ==
|
||||||
|
|
||||||
|
Malware that when executed, attempts to replicate itself and propigate itself.
|
||||||
|
|
||||||
|
== Worm ==
|
||||||
|
|
||||||
|
Malware that can run independently and can propagate a complete working version
|
||||||
|
of itself onto other hosts on a network, by exploiting software vulns in the
|
||||||
|
target system, or using capture credentials
|
||||||
|
Loading…
Reference in New Issue
Block a user