Update for 08-03-22 14:45

This commit is contained in:
Tyler Perkins 2022-03-08 14:45:01 -05:00
parent 4432cb1eb2
commit 75c35d9abe

View File

@ -56,3 +56,40 @@ Capture keystrokes on a compromised system
Code inserted into malware by intruder. Lies dormant until a condition is met, Code inserted into malware by intruder. Lies dormant until a condition is met,
then code triggers some payload. then code triggers some payload.
== Macro virus ==
Virus using macro scripting code, typically embedded in a document or document
template, and triggered when the document is viewed/edited, to run and
replicate into other documents.
== Mobile code ==
Software that can be shipped unchanged to a htereogenous colelctions of
platforms and execute with identical semantics.
== Rootkit ==
Tools used after a system has been compromised to gain root level access
== Spyware ==
Software that monitors keystrokes, screen data, and/or network traffic, or
scans files for sensitive information, and sends it back to some Controler
server.
== Trojan horse ==
Appears to have useful function, but has hidden and malicous purpose and evades
security machanisms, sometimes by exploiting legit authorizations of system
entity that invoked it
== Virus ==
Malware that when executed, attempts to replicate itself and propigate itself.
== Worm ==
Malware that can run independently and can propagate a complete working version
of itself onto other hosts on a network, by exploiting software vulns in the
target system, or using capture credentials