MALWARE IN PENETRATION TESTING 2 (#ISOEH) © ISOEH 2014 for - TopicsExpress



          

MALWARE IN PENETRATION TESTING 2 (#ISOEH) © ISOEH 2014 for more tutorials visit https://isoeh/tutorial.php In order to propagate over the network and infect local data, the malware generally exploit a weakness or vulnerabilities on the target system: Non-expert users Vulnerable Software and operating system Weak Network infrastructure Inadequate security measures (lack of protection) Types of Malware : ->VIRUS The virus is the most typical malicious code available on the market and is consistently the most developed by the code writers. After being reproductive, the viruses start to do a variety of activities, destructive and/or obstruction. Typical examples such as a Virus that can infect the MBR (Master Boot Record) if installed on the first sector of the Hard Disk (called the boot sector), that contains machine code to be loaded into random-access memory (RAM) by a computer systems built-in firmware. This may destroy the entire logical partition and prevent the computer from boot up correctly. ->WORM In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. Generally the Worm infects the computer using vulnerabilities present in the system.
Posted on: Thu, 02 Oct 2014 03:30:00 +0000

Trending Topics



Recently Viewed Topics




© 2015